Security Scan

June 2018

Version 1.2
  • Security Scan now supports SUSE Linux versions 11.x, 12.x, and 15.x, and SUSE PowerLinux versions 11.x and 12.x.

March 2018

Version 1.1.1
  • In the "Security Scan Results" and "Permission and Ownership" pages, the "Find Un-owned Files and Directories" category has been removed in favor of the "The /etc/gshadow" category in the RHEL scan report.

February 2018

Version 1.1
  • Security Scan now supports Red Hat Enterprise Linux versions 5.x, 6.x, 7.x, and RHEL on the IBM Power Platform.

October 2017

Version 1.0.1
  • A user with Sudo access can now run the scanning process on a remote server.
  • The .sh file has been changed from bash shell to .sh shell.

September 2017

Version 1.0

Introducing Security Scan for AIX

Security Scan is a complimentary tool now offered by HelpSystems to help raise awareness of the most common security exposures on AIX. It uses important CIS (Center for Internet Security) benchmarks to establish whether or not security guidelines are in place. The scan results provide a summary of potential security risks, along with detailed information about specific security requirements. Security Scan also provides helpful information about what is at risk, and how to improve overall system security.

Scan and report from the convenience of your windows desktop. Nothing is left behind on the server after scanning.

A system scan offers insight into specific areas of potential improvement, including:

  • Password Policy - Guidance on the configuration of the password policy. This includes recommended length, complexity, reuse, and expiration.
  • Login Policy - Guidance on the configuration of the system login policy including login timeouts, delays, and remote root access.
  • System Services - Helps reduce the number of running services down to those which are core to the common functions of a UNIX server.
  • Secure Remote Access - Aids with installation and configuration of SSH to ensure that the preferred security recommendations remain constant over time.
  • Permissions and Ownership - Provides assistance locking down access to specific key configuration files, log files, and directories.

Back to Product Index

 

Copyright © HelpSystems, LLC.
All trademarks and registered trademarks are the property of their respective owners.
Last Published: 201912051020