![]() ![]() ![]() Funny too, because the one thing I really don’t like at all is lack of dependency checking, and Slackware’s definitely got a lack in that area. SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.I don’t know why, but during my research and playing around with different distros while trying to get the feel for Linux, Slackware’s the distro that kept my interest, as well as some of its duratives. (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT LOSS OF USE, DATA, OR PROFITS OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES IN NO EVENT SHALL OVH SAS AND CONTRIBUTORS BE LIABLE FOR ANYĭIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AREĭISCLAIMED. THIS SOFTWARE IS PROVIDED BY OVH SAS AND CONTRIBUTORS ``AS IS'' AND ANYĮXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED Infrastructure, we can not guarantee that it will work for you. While we use it at OVH to harden our PCI-DSS compliant They are meant to help the system administratorīuilt a secure environment. How to use QEMU image of harbian-audit complicanced Debian GNU/Linux 9 harbian-audit License How to creating and making a QEMU image of harbian-audit complianced Debian GNU/Linux 9 How to use harbian-audit complianced for GNU/Linux Debian 9 QEMU Image Docs The HardenedLinux community has created public AMI images for three different regions.ĪMI Name: harbian-audit complianced for Debian GNU/Linux 9ĪMI Name: harbian-audit complianced for Debian GNU/Linux 9 Docs Nginx-mutual-ssl-proxy-tcp-udp harbian-audit complianced image AMI(Amazon Machine Image) Public How to fix SELinux access denied Use case docs ![]() How to persistent nft rules with debian 10 How to migrating from iptables to nftables in debian10 How to deploy audisp-remote for auditd log How to persistent iptables rules with debian 9 Harbian audit Debian Linux 9 Benchmark Manual Operation docs Includes STIG reference documentation and additional checks recommended by the HardenedLinux community. This document is a description of the additions to the sections not included in the CIS reference documentation. $ bash bin/hardening.sh -apply -only 99.99 Document Harbian-audit benchmark for Debian GNU/Linux 9 $ bash bin/hardening.sh -audit -only 99.99 $ sed -i "s/status=.+/status=enabled/ " etc/conf.d/99.99_custom_script.cfg Do NOT use this option if you have already started to customize your configuration. If a script passes, it will automatically be enabled for future runs. audit-all-enable-passed can be used as a quick way to kickstart your configuration. -apply: Audit your system with all enabled and audit mode scripts and apply changes for enabled scriptsĪdditionally, -audit-all can be used to force running all auditing scripts, including disabled ones.-audit: Audit your system with all enabled and audit mode scripts.To run the checks and apply the fixes, run bin/hardening.sh. Run aka "Harden your distro (After the hardened, you must perform the "After remediation" section) Will create a timestamped backup in this directory. Whenever a script is instructed to edit a file, it This file controls the log levelĪs well as the backup directory. Global configuration is in etc/hardening.cfg. # bash bin/hardening.sh -set-hardening-level If use Network install from a minimal CD to installed Debian GNU/Linux, need install packages before use the hardening tool. 1.1_install_updates No upgrades available 1.1_install_updates Applying Hardening 1.1_install_updates No Upgrades to apply 1.1_install_updates Check Passed Usage Pre-Install # bin/hardening.sh -apply hardening Treating /home/test/harbian-audit/bin/hardening/1.1_install_updates.sh 1.1_install_updates Working on 1.1_install_updates 1.1_install_updates Checking Configuration 1.1_install_updates Performing audit 1.1_install_updates Checking if apt needs an update 1.1_install_updates Fetching upgrades. # bin/hardening.sh -set-hardening-level 5 1.1_install_updates No upgrades available 1.1_install_updates Check Passed # SUMMARY # Total Available Checks : 270 Total Runned Checks : 270 Total Passed Checks : Total Failed Checks : Enabled Checks Percentage : 100.00 % Conformity Percentage : 83.70 % # bin/hardening.sh -audit-all hardening Treating /home/test/harbian-audit/bin/hardening/1.1_install_updates.sh 1.1_install_updates Working on 1.1_install_updates 1.1_install_updates Checking Configuration 1.1_install_updates Performing audit 1.1_install_updates Checking if apt needs an update 1.1_install_updates Fetching upgrades. # sed -i "s#CIS_ROOT_DIR=.*#CIS_ROOT_DIR=' $(pwd )'# " /etc/default/cis-hardening # cp etc/default.cfg /etc/default/cis-hardening ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |