On 13/02/17 20:32, Lubell, Joshua (Fed) wrote:
I'm excited about the planned Windows support!
Hi, happy to hear that.
My particular interest relates to the SCAP Security Guide project.
Specifically, I would like to be able to experiment with the SSG source and
possibly contribute to SSG in
Hi,
A new release of SCAP Workbench is out!
This release brings a lot of bug fixes and improvements, including
a lot of UX improvements and fixes for inappropriate error messages
(fetch remote resources and query capabilities).
Keep in mind that Windows and MacOSX builds use unreleased
Hello folks,
We have the pleasure to announce that SCAP Security Guide version 0.1.32 has
has been release.
Highlights of this release:
* New CMake build system
* Improved NIST 800-171 profile
* Initial RHVH profile
* New CPE to identify systems like machines (bare-metal and VM) and
On 25/02/17 16:43, Lee Wilson wrote:
Hi Everyone,
Hi Lee, sorry for delayed response.
I've recently come across OpenSCAP after wasting my time with
openVAS as a means of improving the way my company does vulnerability
and configuration management of our network devices (e.g. Cisco,
Hi Greg,
On 17/03/17 21:06, Greg Silverman (CS) wrote:
Still having problems, the generated script is an empty file.
Here is the tailoring file I created, ssg-rhel7-ds-tailoring.xml, with the
workbench. It is just an example, to verify I can customize the scanning and
fix generation. This
On 15/03/17 17:24, Eric Holtzclaw wrote:
You do have support for Cisco
http://www.cisco.com/c/en/us/about/security-center/oval-security-automation.html
I see that Cisco provides OVAL content to scan their devices, and even
provides an example of how to do so, but using joval, which can
Hello folks,
We have the pleasure to announce that SCAP Security Guide version 0.1.33
has been released.
Highlights of this release:
* Unification of where templates and csv reside
* Optimization and clean up of build system
* Lots of Ansible remediations added
* Bash remediation functions
Hello folks,
We have the pleasure to announce that SCAP Security Guide version 0.1.35
has been released.
Highlights of this release:
* Remove Red Hat Enterprise Linux 5 content due to being End-of-Life
March 31, 2017
* Added several templates for OVAL checks
* Removal of input directory
Hello,
There are Fedora updates for SCAP Security Guides package updating it to
latest upstream, version 0.1.39.
Fedora 28 - https://bodhi.fedoraproject.org/updates/FEDORA-2018-3f713ee7a8
Fedora 27 - https://bodhi.fedoraproject.org/updates/FEDORA-2018-9516859f4b
Fedora 26 -
Hello folks,
We have the pleasure to announce that SCAP Security Guide version 0.1.39
has been released.
Highlights of this release:
* XCCDF Rules moved to yaml format
* Jinja2 templating for Rules, Checks and remediation introduced
* Profile IDs simplified
* Product Oracle Linux 7 added
*
wrote:
Subject: Re: [Open-scap] SCAP workbench on Windows 7
To: open-scap-list@redhat.com, "Watson Yuuma Sato" <ws...@redhat.com>
Date: Thursday, January 11, 2018, 4:23 PM
Thank you for the response.
SCAP workbench installed under
C:\Program Files (x86)\scap-
On 06/02/18 15:58, Watson Yuuma Sato wrote:
Also, is there any way to push the oval file to the remote server
being scanned rather than it trying to reach out to redhat.com and
failing ?
Currently, there is no way to do that via oscap-ssh.
For the time being, a workaround that can work
On 26/01/18 19:39, Dan White wrote:
Hello Dan,
sorry for late response
A two question head-scratcher:
"admin" has sudo-NOPASSWD permissions and an ssh key pair in place.
The scan works, but what do I need to change to get the results pulled
back to the server sending the command ?
This is a
Hello folks,
We have the pleasure to announce that SCAP Security Guide version 0.1.37
has been released.
Highlights of this release:
* New Profile DISA STIG for Apache HTTP for RHEL7
* Support for Ansible remediations in SSG Test Suite
* Better content support for DISA STIG Viewer
For a more
On 29/08/18 11:05, Dhanushka Parakrama wrote:
Hi Team
Hello Dhanushka,
What version of SSG are you using?
This looks like a bug on 0.1.40 release, the package and service names
used in bash remediation for syslog-ng are different than your commands,
we use "syslogng" for package and
On 29/08/18 11:35, Dhanushka Parakrama wrote:
Hi Watson
On Wed, 29 Aug 2018 at 14:51, Watson Yuuma Sato <mailto:ws...@redhat.com>> wrote:
On 29/08/18 11:05, Dhanushka Parakrama wrote:
Hi Team
Hello Dhanushka,
What version of SSG are you using?
This looks l
018 at 18:28, Watson Yuuma Sato <mailto:ws...@redhat.com>> wrote:
On 29/08/18 18:34, Dhanushka Parakrama wrote:
Hi Team
We have ran the scan for debian 8 using below command
*oscap xccdf eval --profile
xccdf_org.ssgproject.content_profile_anssi_np_nt28_high
On 29/08/18 18:34, Dhanushka Parakrama wrote:
Hi Team
We have ran the scan for debian 8 using below command
*oscap xccdf eval --profile
xccdf_org.ssgproject.content_profile_anssi_np_nt28_high --report
report.html ssg-debian8-ds.xml*
*
*
Got alerts as below ,
===
*
*
Hello folks,
We have the pleasure to announce that SCAP Security Guide version 0.1.38
has been released.
Highlights of this release:
* New License - BSD-3 Clause
* New Profiles for development introduced:
* ANSSI
* HIPAA
* C2S-Docker
* Adoption of CTest for schema validation
*
Hello,
I've proposed updates to Fedora packages for scap-security-guide-0.1.41.
If you can, please, test and provide karma.
Fedora 29 - https://bodhi.fedoraproject.org/updates/FEDORA-2018-0d60f79d06
Fedora 28 - https://bodhi.fedoraproject.org/updates/FEDORA-2018-bad4ea7d4f
Thank you for your
Hello everybody,
We have the pleasure to announce release of SCAP Security Guide 0.1.41.
Although it is named SCAP Security Guide, the project is now under
ComplianceAsCode organization (https://github.com/ComplianceAsCode/content).
For more on this move, see
On 29/08/18 19:00, Dhanushka Parakrama wrote:
Guys
Hello Dhanushka,
The "anssi_np_nt28_high profile" extends "anssi_np_nt28_restrictive",
which "extends anssi_np_nt28_average".
And "average" Profile sets value "sshd_idle_timeout_value=5_minutes",
i.e. 300.
So value 400 for
22 matches
Mail list logo