Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/CISOfy/lynis.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/db
diff options
context:
space:
mode:
authorMichael Boelen <michael.boelen@cisofy.com>2016-10-15 12:26:51 +0300
committerMichael Boelen <michael.boelen@cisofy.com>2016-10-15 12:26:51 +0300
commitfba51401507173e1b503485db5733f7452792448 (patch)
tree5d5535ee47a826ed73fd9a7094a8a3a855260353 /db
parent7dd3c27b975ec7eb54d27a62206275fb4915b26f (diff)
[FIRE-4534] detection of Little Snitch
Diffstat (limited to 'db')
-rw-r--r--db/tests.db51
1 files changed, 26 insertions, 25 deletions
diff --git a/db/tests.db b/db/tests.db
index 96fef125..438394f0 100644
--- a/db/tests.db
+++ b/db/tests.db
@@ -135,17 +135,39 @@ FIRE-4524:test:security:firewalls::Check for CSF presence:
FIRE-4526:test:security:firewalls:Solaris:Check ipf status:
FIRE-4530:test:security:firewalls:FreeBSD:Check IPFW status:
FIRE-4532:test:security:firewalls:MacOS:Check macOS application firewall:
+FIRE-4534:test:security:firewalls:MacOS:Check Little Snitch firewall:
FIRE-4536:test:security:firewalls:Linux:Check nftables status:
FIRE-4538:test:security:firewalls:Linux:Check nftables basic configuration:
FIRE-4540:test:security:firewalls:Linux:Test for empty nftables configuration:
FIRE-4590:test:security:firewalls::Check firewall status:
-HRDN-7220:test:security:hardening::Check if one or more compilers are installed:
-HRDN-7222:test:security:hardening::Check compiler permissions:
-HRDN-7230:test:security:hardening::Check for malware scanner:
HOME-9302:test:security:homedirs::Create list with home directories:
HOME-9310:test:security:homedirs::Checking for suspicious shell history files:
#HOME-9314:test:security:homedirs::Create list with home directories:
HOME-9350:test:security:homedirs::Collecting information from home directories:
+HRDN-7220:test:security:hardening::Check if one or more compilers are installed:
+HRDN-7222:test:security:hardening::Check compiler permissions:
+HRDN-7230:test:security:hardening::Check for malware scanner:
+HTTP-6622:test:security:webservers::Checking Apache presence:
+HTTP-6624:test:security:webservers::Testing main Apache configuration file:
+HTTP-6626:test:security:webservers::Testing other Apache configuration file:
+#HTTP-6628:test:security:webservers::Testing other Apache configuration file:
+#HTTP-6630:test:security:webservers::Determining all loaded Apache modules:
+HTTP-6632:test:security:webservers::Determining all available Apache modules:
+HTTP-6640:test:security:webservers::Determining existence of specific Apache modules:
+HTTP-6641:test:security:webservers::Determining existence of specific Apache modules:
+#HTTP-6642:test:security:webservers::Determining existence of specific Apache modules:
+HTTP-6643:test:security:webservers::Determining existence of specific Apache modules:
+HTTP-6702:test:security:webservers::Check nginx process:
+HTTP-6704:test:security:webservers::Check nginx configuration file:
+HTTP-6706:test:security:webservers::Check for additional nginx configuration files:
+HTTP-6708:test:security:webservers::Check discovered nginx configuration settings:
+HTTP-6710:test:security:webservers::Check nginx SSL configuration settings:
+HTTP-6712:test:security:webservers::Check nginx access logging:
+HTTP-6714:test:security:webservers::Check for missing error logs in nginx:
+HTTP-6716:test:security:webservers::Check for debug mode on error log in nginx:
+#HTTP-67xx:test:security:webservers::Check nginx virtual hosts:
+#HTTP-67xx:test:security:webservers::Check nginx virtual hosts:
+HTTP-6720:test:security:webservers::Check Nginx log files:
INSE-8002:test:security:insecure_services::Check for enabled inet daemon:
INSE-8004:test:security:insecure_services::Check for enabled inet daemon:
INSE-8006:test:security:insecure_services::Check configuration of inetd when disabled:
@@ -192,7 +214,6 @@ MACF-6204:test:security:mac_frameworks::Check AppArmor presence:
MACF-6208:test:security:mac_frameworks::Check if AppArmor is enabled:
MACF-6232:test:security:mac_frameworks::Check SELINUX presence:
MACF-6234:test:security:mac_frameworks::Check SELINUX status:
-RBAC-6272:test:security:mac_frameworks::Check grsecurity presence:
MACF-6290:test:security:mac_frameworks::Check for implemented MAC framework:
MAIL-8802:test:security:mail_messaging::Check Exim status:
MAIL-8814:test:security:mail_messaging::Check postfix process status:
@@ -308,6 +329,7 @@ PRNT-2314:test:security:printers_spools::Check lpd status:
PRNT-2316:test:security:printers_spools:AIX:Checking /etc/qconfig file:
PRNT-2418:test:security:printers_spools:AIX:Checking qdaemon printer spooler status:
PRNT-2420:test:security:printers_spools:AIX:Checking old print jobs:
+RBAC-6272:test:security:mac_frameworks::Check grsecurity presence:
SCHD-7702:test:security:scheduling::Check status of cron daemon:
SCHD-7704:test:security:scheduling::Check crontab/cronjobs:
SCHD-7718:test:security:scheduling::Check at users:
@@ -366,25 +388,4 @@ TOOL-5102:test:security:tooling::Check for presence of Fail2ban:
TOOL-5104:test:security:tooling::Enabled tests for Fail2ban:
TOOL-5190:test:security:tooling::Check presence of available IDS/IPS tooling:
#VIRT-1920:test::virtualization:Checking VMware guest status:security:
-HTTP-6622:test:security:webservers::Checking Apache presence:
-HTTP-6624:test:security:webservers::Testing main Apache configuration file:
-HTTP-6626:test:security:webservers::Testing other Apache configuration file:
-#HTTP-6628:test:security:webservers::Testing other Apache configuration file:
-#HTTP-6630:test:security:webservers::Determining all loaded Apache modules:
-HTTP-6632:test:security:webservers::Determining all available Apache modules:
-HTTP-6640:test:security:webservers::Determining existence of specific Apache modules:
-HTTP-6641:test:security:webservers::Determining existence of specific Apache modules:
-#HTTP-6642:test:security:webservers::Determining existence of specific Apache modules:
-HTTP-6643:test:security:webservers::Determining existence of specific Apache modules:
-HTTP-6702:test:security:webservers::Check nginx process:
-HTTP-6704:test:security:webservers::Check nginx configuration file:
-HTTP-6706:test:security:webservers::Check for additional nginx configuration files:
-HTTP-6708:test:security:webservers::Check discovered nginx configuration settings:
-HTTP-6710:test:security:webservers::Check nginx SSL configuration settings:
-HTTP-6712:test:security:webservers::Check nginx access logging:
-HTTP-6714:test:security:webservers::Check for missing error logs in nginx:
-HTTP-6716:test:security:webservers::Check for debug mode on error log in nginx:
-#HTTP-67xx:test:security:webservers::Check nginx virtual hosts:
-#HTTP-67xx:test:security:webservers::Check nginx virtual hosts:
-HTTP-6720:test:security:webservers::Check Nginx log files:
# EOF