Guide to the Secure Configuration of Red Hat Enterprise Linux 7
Rules, Groups, and Values defined within the XCCDF Benchmark
-
Disable the xdm_exec_bootloader SELinux Boolean
By default, the SELinux boolean <code>xdm_exec_bootloader</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...Rule Medium Severity -
Disable the xdm_sysadm_login SELinux Boolean
By default, the SELinux boolean <code>xdm_sysadm_login</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...Rule Medium Severity -
Disable the xdm_write_home SELinux Boolean
By default, the SELinux boolean <code>xdm_write_home</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>x...Rule Medium Severity -
Disable the xen_use_nfs SELinux Boolean
By default, the SELinux boolean <code>xen_use_nfs</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>xen_...Rule Medium Severity -
Enable the xend_run_blktap SELinux Boolean
By default, the SELinux boolean <code>xend_run_blktap</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>xe...Rule Medium Severity -
Enable the xend_run_qemu SELinux Boolean
By default, the SELinux boolean <code>xend_run_qemu</code> is enabled. If this setting is disabled, it should be enabled. To enable the <code>xend...Rule Medium Severity -
Disable the xguest_connect_network SELinux Boolean
By default, the SELinux boolean <code>xguest_connect_network</code> is enabled. This setting should be disabled as guest users should not be able t...Rule Medium Severity -
Disable the xguest_exec_content SELinux Boolean
By default, the SELinux boolean <code>xguest_exec_content</code> is enabled. This setting should be disabled as guest users should not be able to r...Rule Medium Severity -
Disable the xguest_mount_media SELinux Boolean
By default, the SELinux boolean <code>xguest_mount_media</code> is enabled. This setting should be disabled as guest users should not be able to mo...Rule Medium Severity -
Disable the xguest_use_bluetooth SELinux Boolean
By default, the SELinux boolean <code>xguest_use_bluetooth</code> is enabled. This setting should be disabled as guests users should not be able to...Rule Medium Severity -
Disable the xserver_clients_write_xshm SELinux Boolean
By default, the SELinux boolean <code>xserver_clients_write_xshm</code> is disabled. If this setting is enabled, it should be disabled. To disable...Rule Medium Severity -
Disable the xserver_execmem SELinux Boolean
By default, the SELinux boolean <code>xserver_execmem</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code>...Rule Medium Severity -
Disable the xserver_object_manager SELinux Boolean
By default, the SELinux boolean <code>xserver_object_manager</code> is disabled. If this setting is enabled, it should be disabled. To disable the...Rule Medium Severity -
Disable the zabbix_can_network SELinux Boolean
By default, the SELinux boolean <code>zabbix_can_network</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...Rule Medium Severity -
Disable the zarafa_setrlimit SELinux Boolean
By default, the SELinux boolean <code>zarafa_setrlimit</code> is disabled. If this setting is enabled, it should be disabled. To disable the <code...Rule Medium Severity -
Disable the zebra_write_config SELinux Boolean
By default, the SELinux boolean <code>zebra_write_config</code> is disabled. If this setting is enabled, it should be disabled. To disable the <co...Rule Medium Severity -
Disable the zoneminder_anon_write SELinux Boolean
By default, the SELinux boolean <code>zoneminder_anon_write</code> is disabled. If this setting is enabled, it should be disabled. To disable the ...Rule Medium Severity -
Disable the zoneminder_run_sudo SELinux Boolean
By default, the SELinux boolean <code>zoneminder_run_sudo</code> is disabled. If this setting is enabled, it should be disabled. To disable the <c...Rule Medium Severity -
Services
The best protection against vulnerable software is running less software. This section describes how to review the software which Red Hat Enterpris...Group -
Apport Service
The Apport service provides debugging and crash reporting features on Ubuntu distributions.Group
Node 2
The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.