Item Search

NameAudit NamePluginCategory
GEN001140 - System files and directories must not have uneven access permissions - '/bin'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001140 - System files and directories must not have uneven access permissions - '/usr/lbin'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001140 - System files and directories must not have uneven access permissions - '/usr/sbin'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001180 - All network services daemon files must have mode 0755 or less permissive - '/usr/bin/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001190 - All network services daemon files must not have extended ACLs - /usr/bin/*DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001190 - All network services daemon files must not have extended ACLs - /usr/sbin/*DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/infopage/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001320 - NIS/NIS+/yp files must be owned by root, sys, or bin - '/usr/lib/netsvc/yp/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001320 - NIS/NIS+/yp files must be owned by root, sys, or bin - '/usr/lib/nis/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001320 - NIS/NIS+/yp files must be owned by root, sys, or bin - '/var/yp/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001360 - The NIS/NIS+/yp files must have mode 0755 or less permissive - '/usr/lib/netsvc/yp/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001360 - The NIS/NIS+/yp files must have mode 0755 or less permissive - '/var/yp/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001364 - The /etc/resolv.conf file must have mode 0644 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001368 - The /etc/hosts file must have mode 0644 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001378 - The /etc/passwd file must be owned by root.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001379 - The /etc/passwd file must be group-owned by bin, security, sys, or system.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001390 - The /etc/passwd file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001393 - The /etc/group file must have mode 0644 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001394 - The /etc/group file must not have an extended ACL.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001400 - The /etc/security/passwd file must be owned by root.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001410 - The /etc/security/passwd file must be group-owned by security, bin, sys, or system.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001420 - The /etc/security/passwd file must have mode 0400.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN004360 - The alias file must be owned by root - '/etc/aliases.db'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004370 - The aliases file must be group-owned by root, sys, bin, or system - '/etc/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004390 - The alias file must not have an extended ACL - '/etc/aliases.db'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004390 - The alias file must not have an extended ACL - '/etc/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004390 - The alias file must not have an extended ACL - '/etc/postfix/aliases'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004400 - Files executed through an aliases file must be owned by root and reside within a directory owned and writable only by root.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004410 - Files executed by a mail aliases file must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004480 - The SMTP service log file must be owned by root.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004510 - The SMTP service log file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/vsftpd/ftpusers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005040 - All FTP gssftp users must have a default umask of 077 - '/etc/xinetd.d/gssftp'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005350 - Management Information Base (MIB) files must not have extended ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005360 - The snmpd.conf file must be owned by root.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005375 - The snmpd.conf file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005390 - The /etc/syslog.conf file must have mode 0640 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005536 - The SSH daemon must perform strict mode checking of home directory configuration files.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005760 - The NFS export configuration file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006140 - The /etc/samba/smb.conf file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006150 - The /etc/samba/smb.conf file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006220 - The smb.conf file must use the 'hosts' option to restrict access to Samba.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006300 - The /etc/news/readers.conf (or equivalent) must have mode 0600 or less permissiveDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006310 - The /etc/news/nnrp.access file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006320 - The /etc/news/passwd.nntp file (or equivalent) must have mode 0600 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006360 - The files in /etc/news must be group-owned by root or news.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008120 - If using LDAP for auth or acct information, the /etc/ldap.conf (or equivalent) file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008200 - If using LDAP for auth or account info, the TLS cert file and/or directory (as appropriate) must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008220 - For systems using NSS LDAP, the TLS certificate file must be owned by root - ''/etc/openldap/cacerts/cert.pemDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008280 - If using LDAP for auth or acct info, the TLS cert must not have an extended ACL - '/etc/openldap/cacerts/cert.pem'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL