05.12.2012 Aufrufe

Nessus Compliance Reference

Erfolgreiche ePaper selbst erstellen

Machen Sie aus Ihren PDF Publikationen ein blätterbares Flipbook mit unserer einzigartigen Google optimierten e-Paper Software.

CMD_EXEC........................................................................................................................ 108<br />

FILE_CHECK ..................................................................................................................... 109<br />

FILE_CHECK_NOT ............................................................................................................ 110<br />

FILE_CONTENT_CHECK .................................................................................................. 111<br />

FILE_CONTENT_CHECK_NOT ......................................................................................... 112<br />

GRAMMAR_CHECK .......................................................................................................... 113<br />

PKG_CHECK ..................................................................................................................... 113<br />

PROCESS_CHECK ............................................................................................................ 114<br />

RPM_CHECK ..................................................................................................................... 114<br />

SVC_PROP ........................................................................................................................ 115<br />

XINETD_SVC ..................................................................................................................... 116<br />

Integrierte Tests ...................................................................................................................... 116<br />

Kennwortverwaltung ........................................................................................................... 117<br />

min_password_length .................................................................................................................... 117<br />

max_password_age ....................................................................................................................... 118<br />

min_password_age ........................................................................................................................ 119<br />

Root-Zugriff ........................................................................................................................ 120<br />

root_login_from_console ................................................................................................................ 120<br />

Berechtigungsverwaltung.................................................................................................... 120<br />

accounts_bad_home_permissions ................................................................................................. 120<br />

accounts_bad_home_group_permissions ..................................................................................... 121<br />

accounts_without_home_dir .......................................................................................................... 121<br />

invalid_login_shells ........................................................................................................................ 122<br />

login_shells_with_suid.................................................................................................................... 122<br />

login_shells_writeable .................................................................................................................... 123<br />

login_shells_bad_owner ................................................................................................................. 123<br />

Kennwortdateiverwaltung.................................................................................................... 123<br />

passwd_file_consistency ................................................................................................................ 123<br />

passwd_zero_uid ........................................................................................................................... 124<br />

passwd_duplicate_uid .................................................................................................................... 125<br />

passwd_duplicate_uid .................................................................................................................... 125<br />

passwd_duplicate_username ......................................................................................................... 126<br />

passwd_duplicate_home ................................................................................................................ 126<br />

passwd_shadowed ......................................................................................................................... 127<br />

passwd_invalid_gid ........................................................................................................................ 127<br />

Gruppendateiverwaltung ..................................................................................................... 128<br />

group_file_consistency ................................................................................................................... 128<br />

group_zero_gid .............................................................................................................................. 128<br />

group_duplicate_name ................................................................................................................... 129<br />

group_duplicate_gid ....................................................................................................................... 129<br />

group_duplicate_members ............................................................................................................. 130<br />

group_nonexistant_users ............................................................................................................... 130<br />

Root-Umgebung ................................................................................................................. 130<br />

dot_in_root_path_variable .............................................................................................................. 130<br />

writeable_dirs_in_root_path_variable ............................................................................................ 131<br />

Dateiberechtigungen ........................................................................................................... 131<br />

find_orphan_files ............................................................................................................................ 131<br />

find_world_writeable_files .............................................................................................................. 132<br />

find_world_writeable_directories .................................................................................................... 133<br />

find_world_readable_files .............................................................................................................. 134<br />

find_suid_sgid_files ........................................................................................................................ 135<br />

home_dir_localization_files_user_check ....................................................................................... 136<br />

home_dir_localization_files_group_check ..................................................................................... 137<br />

Verdächtige Dateiinhalte ..................................................................................................... 137<br />

Copyright © 2002-2012 Tenable Network Security, Inc.<br />

4

Hurra! Ihre Datei wurde hochgeladen und ist bereit für die Veröffentlichung.

Erfolgreich gespeichert!

Leider ist etwas schief gelaufen!