Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Solaris PCI Audits and other Updates

Solaris Tenable Network Security has released a Solaris audit policy for PCI 1.1 configurations. We've also released a new SuSE Linux best practices audit policy and have updated several others. These are all available to Tenable Direct Feed and Security Center customers through the Tenable Support Portal.  A specific list of what is now available is as follows:

  • PCI_Linux.audit (Version 1.0.7) This is an update to the existing .audit file which checks for a few more settings, such as if the network time protocol is enabled. It is available under 'Downloads' and then 'Download Configuration Audit Policies'.
  • PCI_Solaris.audit (Version 1.0.0) This audit policy tests for many of the PCI 1.1 configuration requirements for the Solaris 9 operating system. It is available under 'Downloads' and then 'Download Configuration Audit Policies'.
  • PCI_Windows.audit (Version 1.0.3) This is an update to the existing .audit file which checks for a few more settings, such as if the network time protocol is enabled. It is available under 'Downloads' and then 'Download Configuration Audit Policies'.
  • CIS_Redhat_ES4_105.audit (Version 1.0.5) This is an update to the existing  CIS .audit policy file which fixes a few audit checks and bugs. It is available under 'Downloads' and then 'Download CIS Compliance and Audit Files'.
  • SuSE_EL_Best_practice.audit (Version 1.0.0) This is a set of Tenable content to audit SuSE 9 for best practice secure configurations. It is available under 'Downloads' and then 'Download Configuration Audit Policies'.

To use these policies, Security Center users should download these audit files and place them in their /opt/sc3/admin/nasl directory and then make them part of new or existing Vulnerability Polices. Nessus Direct Feed users should download these policies to the system they are operating the Nessus client from and add them to new or existing Nessus scan policies.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.