Red Hat DIRECTORY SERVER 8.1 - 11-01-2010 Uživatelský manuál Strana 15

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 18
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 14
File Find
The File Find module reports weaknesses in the file permissions and the
configuration files.
Table 2-3 gives a list of the checks and their CIS sections.
Table 2-3
Checks and CIS sections
CIS sectionCheck
2.3, 3.2, 4.14, 4.3, 4.4, 5.1, 5.2, 6.2, 7.1, 7.2,
7.9, 8.1, 8.2, 8.4, 8.6, 8.8, 8.10, 9.1, 9.10, 9.11,
9.4, 10.2, 10.3, 11.1.11, 11.1.12, 11.1.13,
11.1.14, 11.1.15, 11.4.1
File Content Search
7.7Setgid executable files
7.7Setuid executable files
7.8Unowned Directories/Files
7.5World writable directories with sticky bit
7.6World writable files
Login Parameters
The Login Parameters module reports accounts, resources, and settings that are
not complaint with the policies.
Table 2-4 gives a list of the checks and their CIS sections.
Table 2-4
Checks and CIS sections
CIS sectionCheck
9.3Inactive accounts
9.1Locked Accounts
10.1Warning Banners
Network Integrity
The Network Integrity module reports the system configuration settings that
pertain to authentication and remote access.
15Policy modules
File Find
Zobrazit stránku 14
1 2 ... 10 11 12 13 14 15 16 17 18

Komentáře k této Příručce

Žádné komentáře