Get a Pentest and security assessment of your IT network.

Uncategorized

RedHat Checklist Script – This script is designed to perform a security evaluation against industry best practices, over RedHat and RedHat based systems, to detect configuration deviations.

This script is designed to perform a security evaluation against industry best practices, over RedHat and RedHat based systems, to detect configuration deviations. It was developed due to the need to ensure that the servers within the author’s workplace would comply with specific policies. As this tool was designed specifically for this purpose, “lynis” was not used for the task.

 

You can download it from the following link: https://packetstormsecurity.com/files/download/128018/redhatchecklist-master.zip

Source: https://packetstormsecurity.com/files/128018/RedHat-Checklist-Script.html