Nessus Compliance Reference RU

  • View
    115

  • Download
    6

Embed Size (px)

Text of Nessus Compliance Reference RU

Nessus14 2011 .( 6)

2011 . Tenable Network Security, Inc. . Tenable Network Security Nessus Tenable Network Security, Inc. ProfessionalFeed Tenable Network Security, Inc. .

Tenable Network Security, Inc. 7063 Columbia Gateway Drive, Suite 100, Columbia, MD 21046 410.872.0555 sales@tenable.com www.tenable.com

.. ................................................................................................................................. 6 ............................................................................................................. 6 ...................................................................................... 6 Windows .audit ........... 7 ............................................................................................................................ 8 ...................................................................................................................... 8 ........................................................................................................................ 8 ........................................................................................................... 9 check_type ................................................................................................................... 9 info ..............................................................................................................................10 ACL .................................................................................................................11 ............................................................................11 ...........................................................................13 ...........................................................................15 Launch.............................................................16 Launch2 ...........................................................18 ........................................................................19 ..................................................................................................20 PASSWORD_POLICY..........................................................................................................20 LOCKOUT_POLICY .............................................................................................................22 KERBEROS_POLICY...........................................................................................................23 AUDIT_POLICY....................................................................................................................24 AUDIT_POLICY_SUBCATEGORY.......................................................................................25 CHECK_ACCOUNT .............................................................................................................27 CHECK_LOCAL_GROUP ....................................................................................................29 ANONYMOUS_SID_SETTING .............................................................................................30 SERVICE_POLICY ...............................................................................................................31 FILE_CHECK .......................................................................................................................32 FILE_VERSION ....................................................................................................................33 REG_CHECK .......................................................................................................................34 REGISTRY_SETTING ..........................................................................................................35 GROUP_MEMBERS_POLICY .............................................................................................39 USER_GROUPS_POLICY ...................................................................................................40 USER_RIGHTS_POLICY .....................................................................................................41 FILE_PERMISSIONS ...........................................................................................................43 FILE_AUDIT .........................................................................................................................45 FILE_CONTENT_CHECK ....................................................................................................46 FILE_CONTENT_CHECK_NOT ...........................................................................................48 REGISTRY_PERMISSIONS.................................................................................................49 REGISTRY_AUDIT...............................................................................................................50 SERVICE_PERMISSIONS ...................................................................................................51 SERVICE_AUDIT .................................................................................................................53 WMI_POLICY .......................................................................................................................54 ................................................................................................................................55 ......................................................................56 ........................................................................................63

2002 - 2011 . Tenable Network Security, Inc.

2

....................................................................................................................................63 Windows .audit ............66 ...........................................................................................................................67 ..................................................................................................................68 .....................................................................................................71 ..........................................................................................71 1: TNS, Nessus ........72 2: TNS, France .........72 3: TNS DOC, Nessus...............................................................................................................73 4: TNS DOC, Nessus 11- ........................................................................................73 5: TNS DOC, Nessus 11- , 4 .........................................................................................................74 6: TNS, Correlation 50 .................................................................................75 7: ........................................................75 8: .......................................77 9: ...............................78 ...........................................................................78 ........................................................................................79 Cisco IOS .audit .........79 ...........................................................................................................................80 ......................................................................................................................80 .....................................................................................................85 1: SNMP ACL .........................................................85 2: , finger ...............................................86 3: , , , SNMP .................................................................................................................87 4: SSH ............................................88 ....................................................................................................................................89 .audit.........90 ...........................................................................................................................91 ......................................................................................................................91 .....................................................................................................93 1: ....................94 2: ....95 3: sql_types ..........................................................................................................................95 ....................................................................................................................................96 Unix .audit ..................97 ...........................................................................................................................97 ......................................................................................................................98 ................................................................................................105

2002 - 2011 . Tenable Network Security, Inc.

3

CHKCONFIG ......................................................................................................................105 CMD_EXEC........................................................................................................................106 FILE_CHECK .....................................................................................................................106 FILE_CHECK_NOT ............................................................................................................107 FILE_CONTENT_CHECK ..................................................................................................108 FILE_CONTENT_CHECK_NOT ..