On 12/3/12 7:04 PM, Shawn Wells wrote:
0001-DISA-FSO-requested-updates-to-RHEL6-input-system-sof.patch From 11f3bb586976ce7ca53414f507b818c2080be42f Mon Sep 17 00:00:00 2001 From: Shawn Wells<[email protected]> Date: Mon, 3 Dec 2012 19:04:03 -0500 Subject: [PATCH] DISA FSO requested updates to RHEL6/input/system/software/integrity.xml DISA FSO requested updates to RHEL6/input/system/software/integrity.xml https://fedorahosted.org/scap-security-guide/ticket/162 --> closed --- RHEL6/input/system/software/integrity.xml | 8 ++++---- 1 files changed, 4 insertions(+), 4 deletions(-) diff --git a/RHEL6/input/system/software/integrity.xml b/RHEL6/input/system/software/integrity.xml index 14730e2..54c106c 100644 --- a/RHEL6/input/system/software/integrity.xml +++ b/RHEL6/input/system/software/integrity.xml @@ -146,12 +146,12 @@ See the man page for <tt>rpm</tt> to see a complete explanation of each column. <description>The RPM package management system can check file access permissions of installed software packages, including many that are important to system security. The following command will list which -files on the system have permissions that are different from what +files on the system have permissions different from what is expected by the RPM database: <pre># rpm -Va | grep '^.M'</pre> </description> <ocil clause="there is output"> -The following command will list which files on the system have permissions that are different from what +The following command will list which files on the system have permissions different from what is expected by the RPM database: <pre># rpm -Va | grep '^.M'</pre> </ocil> @@ -220,7 +220,7 @@ to fulfill this role. </description> <ocil clause="no host-based intrusion detection tools are installed"> Inspect the system to determine if intrusion detection software has been installed. -Verify that the intrusion detection software is active. +Verify the intrusion detection software is active. <!-- add instructions for HBSS? the text in the RHEL 5 STIG is wrong as usual --> </ocil> <rationale> @@ -256,7 +256,7 @@ Inspect the system for a cron job or system service which executes a virus scanning tool regularly. <br/> <!-- this should be handled as DoD-specific text in a future revision --> -To verify that the McAfee command line scan tool (uvscan) is scheduled for +To verify the McAfee command line scan tool (uvscan) is scheduled for regular execution, run the following command to check for a cron job: <pre># grep uvscan/etc/cron* /var/spool/cron/*</pre> This will reveal if and when the uvscan program will be run. -- 1.7.1
Ack & pushed -- Shawn Wells Technical Director, U.S. Intelligence Programs (e) [email protected] (c) 443.534.0130
_______________________________________________ scap-security-guide mailing list [email protected] https://lists.fedorahosted.org/mailman/listinfo/scap-security-guide
