Item Search

NameAudit NamePluginCategory
GEN001140 - System files and directories must not have uneven access permissions - '/sbin/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001140 - System files and directories must not have uneven access permissions - '/usr/lbin/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/man'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001379 - The /etc/passwd file must be group-owned by root, bin, or sys.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001430 - The /etc/shadow (or equivalent) file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001500 - All interactive user home directories must be owned by their respective users.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001550 - Files and directories in user home directories must be group-owned by a group of which the home directory's owner is a member.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc1.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001640 - Run control scripts must not execute world-writable programs or scripts.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001680 - All system start-up files must be group-owned by root, sys, bin, other, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/csh.cshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/ksh.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001760 - All global initialization files must be group-owned by root, sys, bin, other, system, or the system default - '/etc/csh.login'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001830 - All skeleton files (typically in /etc/skel) must be group-owned by root, bin, sys, system, or other.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.bash_profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.emacs'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.env'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001940 - User start-up files must not execute world-writable programs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '/etc/hosts.equiv'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - Group '.shosts'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002210 - All shell files must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/snd/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002330 - Audio devices must not have extended ACLs - '/dev/audio*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002960 - Access to the cron utility must be controlled using the cron.allow and/or cron.deny file(s) - 'cron.deny exists'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003020 - Cron must not execute programs in, or subordinate to, world-writable directories.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003040 - Crontabs must be owned by root or the crontab creator - '/etc/crontab'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'adm' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'bin' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'halt' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'lp' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'mail' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'operator' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'uucp' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003090 - Crontab files must not have extended ACLs - '/var/spool/cron'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.daily'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005395 - The /etc/syslog.conf file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005400 - The /etc/syslog.conf file must be owned by root.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005760 - The NFS export configuration file must have mode 0644 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005800 - All NFS-exported system files and system directories must be owned by root.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN006150 - The /usr/lib/smb.conf file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN006210 - The /var/private/smbpasswd file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN006220 - The smb.conf file must use the hosts option to restrict access to Samba.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN008060 - If the system is using LDAP the /etc/ldap.conf file must have mode 0644 or less permissiveDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN008080 - If the system is using LDAP the /etc/ldap.conf file must be owned by rootDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN008140 - The TLS certificate authority file and/or directory (as appropriate) must be owned by rootDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN008200 - The LDAP TLS certificate authority file must not have an extended ACLDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL