TOC & Recently Viewed

Recently Viewed Topics

FILE_CHECK_NOT

The “FILE_CHECK_NOT” audit consists of three or more keywords. The keywords type, description, and file are mandatory and are followed by one or more checks. Current syntax supports checking for owner, group and file permissions. Similar to the FILE_CHECK audit, the “ignore” keyword can be used to ignore one or more files if a file glob is specified.

This function is the opposite of FILE_CHECK. A policy fails if a file does not exist or if its mode is the same as the one defined in the check itself.

It is possible to use globs in FILE_CHECK_NOT (e.g., /var/log/*). However, note that globs will only be expanded to files, not to directories.

Examples

<custom_item>

type: FILE_CHECK_NOT

description: "Make sure /bin/bash does NOT belong to root"

file: "/bin/bash"

owner: "root"

</custom_item>

<custom_item>

type: FILE_CHECK_NOT

description: "Make sure that /usr/bin/ssh does NOT exist"

file: "/usr/bin/ssh"

</custom_item>

<custom_item>

type: FILE_CHECK_NOT

description: "Make sure /root is NOT world writeable"

file: "/root"

mode: "0777"

</custom_item>

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.