Category: Recent Posts

0

RHEL6 Installation and Security Bench Marking Recommendations – Part5

Logging and Auditing The items in this section describe how to configure logging, log monitoring, and auditing, using tools included with RHEL6. It is recommended that rsyslog be used for logging (with logwatch providing summarization) and auditd be used for auditing (with aureport providing summarization) to...

0

RHEL6 Installation based on Security Bench Marking Recommendations – Part2

Configuration and Tuning of OS Services While applying system updates and patches helps correct known vulnerabilities, one of the best ways to protect the system against as yet unreported vulnerabilities is to disable all services that are not required for normal system operation. This prevents the...

0

RHEL6 Installation based on Security BenchMarking Recommendations – Part1

1 Install Updates, Patches and Additional Security Software 1.1 Filesystem Configuration Directories that are used for system-wide functions can be further protected by placing them on separate partitions. This provides protection for resource exhaustion and enables the use of mounting options that are applicable to the...

Page 8 of 10

[contact-form to='ramkumar.ramadevu@gmail.com' subject='New Learning Request Submitted'][contact-field label='Name' type='name' required='1'/][contact-field label='Email' type='email' required='1'/][contact-field label='Learning Request' type='textarea' required='1'/][contact-field label='Are you Looking for ' type='radio' required='1' options='Paid Training,Free Training'/][/contact-form]

What is your Learning Goal for Next Six Months ? Talk to us