String ID: STKU_ATSUONLY
Category: Policy Compliance
|
UNIX (5931)
|
Title: Only root can use at and batch
Description:Your system is set so only the root account can use
the at and batch commands. See the man pages for information about
the at command. This message provides information but does not
require any security action on your part.
|
Severity: green-0
Correctable: false
Snapshot Updatable: false
Template Updatable: false
Information Field Format: [%s]
|
String ID: STKU_ATALLOWWARN
Category: Policy Compliance
|
UNIX (5948)
|
Title: Non root user allowed to use at and batch
Description:This user is allowed to use the at. Only Authorised
users should be allowed administrative access to at and batch
commands.
|
Severity: red-4
Correctable: false
Snapshot Updatable: false
Template Updatable: false
Information Field Format: [%s]
|
String ID: STKU_ATDENYEXISTS
Category: Policy Compliance
|
UNIX (5946)
|
Title: at.deny file exists
Description:The at.deny file contains a list of users that
cannot access the at command.CIS recommended that file be
removed.
|
Severity: red-4
Correctable: false
Snapshot Updatable: false
Template Updatable: false
Information Field Format: [%s]
|
String ID: STKU_CRONNSUSER
Category: Policy Compliance
|
UNIX (5943)
|
Title: Non-existent user configured for cron or at
Description:This user is listed in one or more of the cron and
batch configuration files but do not exist on the system. This can
represent a security breach if the named accounts are later
recreated and either granted cron or at access without authority or
denied cron or at access when they should have authority. You
should correct this problem by removing the listed users from the
indicated files.
|
Severity: green-0
Correctable: false
Snapshot Updatable: false
Template Updatable: false
Information Field Format: [%s]
|