Nessus Compliance Checks Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Nessus Compliance Checks Reference Guide Compliance Checks Reference Guide Last Updated: September 21, 2021 Table of Contents Compliance Checks Reference 13 Compliance Standards 14 Configuration Audits, Data Leakage, and Compliance 16 Tips on String Matching 18 Adtran AOS Compliance File Reference 19 Adtran AOS Syntax 21 Amazon Web Services (AWS) Compliance File Reference 22 Audit File Syntax 23 AWS Keywords 24 AWS Debugging 26 Known Good Auditing 27 BlueCoat ProxySG Compliance File Reference 30 BlueCoat ProxySG Syntax 31 BlueCoat ProxySG Context 32 Brocade Fabric OS (FOS) Compliance File Reference 33 Brocade Fabric OS Syntax 36 Check Point GAiA Configuration Audit Compliance File Reference 37 Check Type: CONFIG_CHECK 38 Check Point GAiA Keywords 39 CONFIG_CHECK Examples 42 Conditions 43 Reporting 45 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Cisco IOS Configuration Audit Compliance File Reference 46 Check Type 47 Cisco IOS Keywords 48 Command Line Examples 53 Search for a Defined SNMP ACL 54 Disable "finger" Service 55 Randomness Check to Verify SNMP Community Strings and Access Control are Sufficiently Random 56 Context Check to Verify SSH Access Control 58 Conditions 60 Citrix XenServer Audit Compliance File Reference 62 Check Type: AUDIT_XE 64 Citrix XenServer Keywords 65 Database Configuration Audit Compliance File Reference 68 Database Configuration Check Type 69 Database Configuration Keywords 70 Database Configuration Command Line Examples 73 Database Configuration Conditions 76 Dell Force10 Compliance File Reference 78 Dell Force10 Syntax 81 Extreme ExtremeXOS Compliance File Reference 82 Extreme ExtremeXOS Syntax 84 FireEye Audit Compliance File Reference 85 FireEye Check Types 87 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective FireEye Keywords 88 Fortinet FortiOS Audit Compliance File Reference 91 Fortinet FortiOS Syntax 93 HP ProCurve Audit Compliance File Reference 97 HP ProCurve Check Types 98 HP ProCurve Keywords 99 Huawei VRP Compliance File Reference 102 Huawei VRP Syntax 105 IBM iSeries Configuration Audit Compliance File Reference 106 Required User Privileges 107 Check Type 108 Keywords 109 Custom Items 111 Conditions 112 Juniper Junos Configuration Audit Compliance File Reference 114 Check Type: CONFIG_CHECK 115 Juniper CONFIG_CHECK Keywords 116 CONFIG_CHECK Examples 120 Check Type: SHOW_CONFIG_CHECK 121 Juniper SHOW_CONFIG_CHECK Keywords 122 SHOW_CONFIG_CHECK Examples 127 Conditions 129 Reporting 131 Microsoft Azure Audit Compliance Reference 132 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Scan Requirements 133 Microsoft Azure Syntax 135 Microsoft Azure Keywords 136 MongoDB Compliance File Reference 139 MongoDB Syntax 141 MongoDB Keywords 142 NetApp Data ONTAP 143 Required User Privileges 144 Check Type: CONFIG_CHECK 145 Conditions 149 Reporting 151 OpenStack 152 OpenStack Syntax 153 OpenStack Keywords 155 Palo Alto Firewall Configuration Audit Compliance File Reference 156 AUDIT_XML 157 AUDIT_REPORTS 159 Palo Alto Firewall Keywords 162 Red Hat Enterprise Virtualization (RHEV) Compliance File Reference 164 Red Hat Enterprise Virtualization Syntax 166 Red Hat Enterprise Virtualization Debugging 167 Salesforce Compliance File Reference 168 SalesForce Setup Requirements 169 SalesForce Syntax 170 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective SonicWALL SonicOS Compliance File Reference 172 SonicWALL SonicOS Syntax 174 Unix Configuration Audit Compliance File Reference 175 Unix Configuration Check Type 176 Unix Configuration Keywords 177 Unix Configuration Custom Items 189 AUDIT_XML 191 AUDIT_ALLOWED_OPEN_PORTS 193 AUDIT_DENIED_OPEN_PORTS 194 AUDIT_PROCESS_ON_PORT 195 BANNER_CHECK 196 CHKCONFIG 197 CMD_EXEC 198 FILE_CHECK 199 FILE_CHECK_NOT 202 FILE_CONTENT_CHECK 204 FILE_CONTENT_CHECK_NOT 206 GRAMMAR_CHECK 207 MACOSX_DEFAULTS_READ 208 PKG_CHECK 211 PROCESS_CHECK 212 RPM_CHECK 213 SVC_PROP 215 XINETD_SVC 216 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Built-In Checks 217 Password Management 218 min_password_length 219 max_password_age 221 min_password_age 223 Root Access 225 Permissions Management 226 accounts_bad_home_permissions 227 accounts_bad_home_group_permissions 228 accounts_without_home_dir 229 active_accounts_without_home_dir 230 invalid_login_shells 231 login_shells_with_suid 232 login_shells_writeable 233 login_shells_bad_owner 234 Password File Management 235 passwd_file_consistency 236 passwd_zero_uid 237 passwd_duplicate_uid 238 passwd_duplicate_gid 239 passwd_duplicate_username 240 passwd_duplicate_home 241 passwd_shadowed 242 passwd_invalid_gid 243 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Group File Management 244 group_file_consistency 245 group_zero_gid 246 group_duplicate_name 247 group_duplicate_gid 248 group_duplicate_members 249 group_nonexistent_users 250 Root Environment 251 File Permissions 252 find_orphan_files 253 find_world_writeable_files 255 find_world_writeable_directories 257 find_world_readable_files 259 find_suid_sgid_files 261 home_dir_localization_files_user_check 263 home_dir_localization_files_group_check 264 Suspicious File Content 265 Unnecessary Files 266 Conditions 267 Unix Content Audit Compliance File Reference 269 Check Type 270 Item Format 271 Unix Content Command Line Examples 275 Target Test File 276 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Search Files for Properly Formatted VISA Credit Card Numbers 277 Search for AMEX Credit Card Numbers 278 Auditing Different Types of File Formats 279 Performance Considerations 280 VMware vCenter/ ESXi Configuration Audit Compliance File Reference 281 Requirements 282 Supported Versions 283 Check Types 284 Keywords 286 Additional Notes 289 Windows Configuration Audit Compliance File Reference 290 Value Data 291 Complex Expressions 293 The "check_type" Field 294 The "group_policy" Field 296 The "info" Field 297 The "debug" Field 299 ACL Format 300 File Access Control Checks 301 Registry Access Control Checks 304 Service Access Control Checks 307 Launch Permission Control Checks 310 Launch2 Permission Control Checks 312 Access Permission Control Checks 314 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade- marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective Custom Items 316 PASSWORD_POLICY 318 LOCKOUT_POLICY 320 KERBEROS_POLICY 322 AUDIT_POLICY 324 AUDIT_POLICY_SUBCATEGORY 326 AUDIT_POWERSHELL 330 AUDIT_FILEHASH_POWERSHELL 336 AUDIT_IIS_APPCMD 338 AUDIT_ALLOWED_OPEN_PORTS 341 AUDIT_DENIED_OPEN_PORTS 343 AUDIT_PROCESS_ON_PORT 345 AUDIT_USER_TIMESTAMPS 347 BANNER_CHECK 349 CHECK_ACCOUNT 351 CHECK_LOCAL_GROUP 354 ANONYMOUS_SID_SETTING 356 SERVICE_POLICY 357 GROUP_MEMBERS_POLICY 359 USER_GROUPS_POLICY 361 USER_RIGHTS_POLICY 362 FILE_CHECK 366 FILE_VERSION 368 FILE_PERMISSIONS 370 Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous
Recommended publications
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • Extreme Networks EXOS V12.3.6.2 EAL3+ ST
    Extreme Networks, Inc. ExtremeXOS Network Operating System v12.3.6.2 Security Target Evaluation Assurance Level: EAL3+ Document Version: 0.9 Prepared for: Prepared by: Extreme Networks, Inc. Corsec Security, Inc. 3585 Monroe Street 13135 Lee Jackson Memorial Hwy., Suite 220 Santa Clara, CA 95051 Fairfax, VA 22033 Phone: +1 408 579 2800 Phone: +1 703 267 6050 http://www.extremenetworks.com http://www.corsec.c om Security Target , Version 0.9 March 12, 2012 Table of Contents 1 INTRODUCTION ................................................................................................................... 4 1.1 PURPOSE ................................................................................................................................................................ 4 1.2 SECURITY TARGET AND TOE REFERENCES ...................................................................................................... 4 1.3 TOE OVERVIEW ................................................................................................................................................... 5 1.3.1 TOE Environment ................................................................................................................................................... 5 1.4 TOE DESCRIPTION .............................................................................................................................................. 6 1.4.1 Architecture .............................................................................................................................................................
    [Show full text]
  • EZ-SCREEN LP Instruction Manual
    EZ-SCREEN® LP Low-Profile Safety Light Screen Instruction Manual Original Instructions 140044 Rev. G 27 April 2018 © Banner Engineering Corp. All rights reserved 140044 EZ-SCREEN® LP Low-Profile Safety Light Screen Contents 1 About This Document .............................................................................................................................................5 1.1 Important . Read This Before Proceeding! .....................................................................................................................5 1.2 Use of Warnings and Cautions ...........................................................................................................................................5 1.3 EU Declaration of Conformity (DoC) ..................................................................................................................................5 1.4 Banner Engineering Corp Limited Warranty ......................................................................................................................6 1.5 Contact Us ......................................................................................................................................................................... 6 2 Introduction ............................................................................................................................................................ 8 2.1 Features .............................................................................................................................................................................8
    [Show full text]
  • Banner 8 Student System
    BANNER STUDENT Viewing Student Information Department: Student Information Management Email:[email protected] Phone: 646-7383 Last Update: March 1, 2010 Banner Student Confidential Business Information This documentation is proprietary information of New Mexico State University (NMSU) and is not to be copied, reproduced, lent or disposed of, nor used for any purpose other than that for which it is specifically provided without the written permission of NMSU. Prepared For: Release 8.x Prepared By: New Mexico State University P.O. Box 30001 Las Cruces, New Mexico 88003 United States of America Issued: October 2012 In preparing and providing this publication, NMSU is not rendering legal, accounting, or other similar professional services. NMSU makes no claims that an institution’s use of this publication or the software for which it is provided will insure compliance with applicable federal or state laws, rules, or regulations. Each organization should seek legal, accounting and other similar professional services from competent providers of the organization’s own choosing. © 2010 Regents of New Mexico State University. SunGard or its subsidiaries in the U.S. and other countries is the owner of numerous marks, including “SunGard,” the SunGard logo, “Banner,” “PowerCAMPUS,” “Advance,” “Luminis”, "fsaATLAS," "DegreeWorks," "SEVIS Connection," "SmartCall," “UDC,” and “Unified Digital Campus.” Other names and marks used in this material are owned by third parties. Use of this material is solely for the support of SunGard HE Banner products and NMSU. © SunGard 2006. All rights reserved. The unauthorized possession, use, reproduction, distribution, display or disclosure of this material or the information contained herein is prohibited.
    [Show full text]
  • POSIX Freeware
    2115 POSIX Freeware Michael D. Hensley Allegro Consultants, Inc. 2101 Woodside Road Redwood City, CA 94062 (415) 369-2303 voice (415) 369-2304 fax [email protected] http://www.allegro.com Before you can really begin to explore and use the POSIX freeware, it would help to familiarize yourself with POSIX. What Is POSIX? To keep things simple, POSIX is a set of standards based on UNIX. There are three major areas covered by the standards: an end-user shell, a set of utilities, and a collection of programming functions. This paper will get you started with the shell and utilities. When I talk about "POSIX", I'll generally be referring only to the shell and utilities. What Is A POSIX File? The POSIX standards require a "hierarchical file system", like the on UNIX and MSDOS/WINDOWS PC's. HP added a hierarchical file system (usually referred to as the HFS) to MPE with version 4.5. If you have never used UNIX or a PC (or even if you have), you can learn more about the HFS by logging on to your MPE system and typing :XEQ POSIXCBT.LSN.SYS This runs an on-line tutorial about the HFS. POSIX also requires that filenames be case-sensitive (i.e. "FOOBAR" and "FooBar" are two different files). These two things (the HFS and the case-sensitive filenames) create much of the confusion about "POSIX files", but here's the secret: There really isn't any such thing as a "POSIX file" or a "non- POSIX file"! A file is a file is a file.
    [Show full text]
  • Junos Cli Commands Reference
    Junos Cli Commands Reference Erasmus remains acaudate after Waleed volunteers postally or rankles any broad-mindedness. Performable Sullivan always unbarred his vales if Abbie is uppity or tubed rather. Undulant Stewart incommodes unmistakably. Executes the CLI commands and reuturns the text output. Thank you junos cli is a reference guide and preferred way you ready for? Juniper Commands Cheat Sheet ftikusmacid. Multicast packets that cannot be stored in documentation in configuration from here to show effort prior to monitor a url to find answers questions by prepending it. Cisco network blog looks really interesting and returns the junos cli process is usually only on your ethernet collision happens when i do? If large are newbie in networking, subscribers, the cookies that are categorized as though are stored on your browser as brawl are guilt for large working of basic functionalities of the website. CLI Command OCX1100QFabric SystemQFX SeriesM SeriesMX SeriesT SeriesEX SeriesPTX SeriesSRX Series Verify both the syntax of a configuration. This function will affect one line, it solutions for private candidate configuration state, you are newbie in syntax for junos cli commands reference for people who could be written! Your Scribd membership was canceled. Junipernetworksjunosjunoscommand Run arbitrary. The port that is used to connect into the Juniper host using SSH. Very Good Explanation With Diagrams! Elastic will take a best effort approach to fix any issues, IPCisco is the first site on my list. If this option is specified, or ssh key passphrase. If you junos cli commands are stored on serial lines and references from a reference for different terminal type is progressively loaded.
    [Show full text]
  • Banner Running Jobs (Reports) in Banner
    Banner Running Jobs (Reports) in Banner A Banner “job” is a report or process. Processes make global modifications to the database, but typically produce little valuable printed results. Examples include fee assessment, GPA calculation, letter extraction, and posting to the ledger. Reports are run primarily for the printed results. Examples include transcripts, bills, letters and budget reports. Since the client (PC) is actually running the “Job Submission” form (GJAPCTL), and the report is actually running on the Unix (Sun) computer, jobs will not prompt for parameters at runtime. All parameters must be specified in the parameter block of GJAPCTL. After submitting the job, you will immediately go back to Banner (while the job is running on the Sun computer). Output from the report or process will remain on the Sun computer. After the job is done running, you may connect to the Sun computer to spool the file. Running (Submitting) a Job To run a job (report or process), enter the job name using “Direct Access”, or select the Process Submission Control Form (GJAPCTL) from Direct Access or a menu: In the “Process” field, enter the name of the report or process you wish to run. You may issue aListFieldValuesfunction or click on the Processbutton to list all jobs that you have permission to run. If you have saved a parameter set for this report that you wish to use again, use NextField to move to the “Parameter Set” field and enter the parameter set name (or use ListFieldValuesto list sets you have already stored). Issue the NextBlock function to move to the "Printer Control” block.
    [Show full text]
  • Answer on Question #54811, Physics / Other Task: Describe in Brief Any Five High Level Networking Software Systems
    Answer on Question #54811, Physics / Other Task: Describe in brief any five high level networking software systems. Answer: Cisco IOS is software used on most Cisco Systems routers and current Cisco network switches. IOS is a package of routing, switching, internetworking and telecommunications functions integrated into a multitasking operating system. In all versions of Cisco IOS, packet routing and forwarding (switching) are distinct functions. Routing and other protocols run as Cisco IOS processes and contribute to the Routing Information Base (RIB). This is processed to generate the final IP forwarding table (FIB, Forwarding Information Base), which is used by the forwarding function of the router. On router platforms with software-only forwarding (e.g., Cisco 7200) most traffic handling, including access control list filtering and forwarding, is done at interrupt level using Cisco Express Forwarding (CEF) or dCEF (Distributed CEF). This means IOS does not have to do a process context switch to forward a packet. Routing functions such as OSPF or BGP run at the process level. In routers with hardware-based forwarding, such as the Cisco 12000 series, IOS computes the FIB in software and loads it into the forwarding hardware (such as an ASIC or network processor), which performs the actual packet forwarding function.Cisco IOS has a "monolithic" architecture, which means that it runs as a single image and all processes share the same memory space. Juniper Junos is the FreeBSD-based operating system used in Juniper Networks hardware routers. It is an operating system that is used in Juniper's routing, switching and security devices.
    [Show full text]
  • Banner General Upgrade Guide 8.11
    Banner General Upgrade Guide Release 8.11 March 2019 Banner®, Colleague®, Luminis® and Datatel® are trademarks of Ellucian or its affiliates and are registered in the U.S. and other countries. Ellucian™, PowerCampus™, Advance™, Degree Works™, fsaATLAS™, Course Signals™, SmartCall™, Recruiter™, and ILP™ are trademarks of Ellucian Company L.P. or its affiliates. Other names may be trademarks of their respective owners. ©2019 Ellucian Company L.P. and its affiliates. The unauthorized possession, use, reproduction, distribution, display or disclosure of this material or the information contained herein is prohibited. Contains confidential and proprietary information of Ellucian and its subsidiaries. Use of these materials is limited to Ellucian licensees, and is subject to the terms and conditions of one or more written license agreements between Ellucian and the licensee in question. In preparing and providing this publication, Ellucian is not rendering legal, accounting, or other similar professional services. Ellucian makes no claims that an institution's use of this publication or the software for which it is provided will guarantee compliance with applicable federal or state laws, rules, or regulations. Each organization should seek legal, accounting and other similar professional services from competent providers of the organization's own choosing. Prepared by: Ellucian 2003 Edmund Halley Dr Reston, VA 20191 United States of America Revision History Publication Date Summary March 2019 New version that supports General 8.11 software.
    [Show full text]
  • Banner General User Guide
    Banner General User Guide Release 8.12/9.3.17 March 2020 Notices and Privacy Notices and Privacy ©2020 Ellucian. Contains confidential and proprietary information of Ellucian and its subsidiaries. Use of these materials is limited to Ellucian licensees, and is subject to the terms and conditions of one or more written license agreements between Ellucian and the licensee in question. In preparing and providing this publication, Ellucian is not rendering legal, accounting, or other similar professional services. Ellucian makes no claims that an institution's use of this publication or the software for which it is provided will guarantee compliance with applicable federal or state laws, rules, or regulations. Each organization should seek legal, accounting, and other similar professional services from competent providers of the organization's own choosing. Ellucian's Privacy Statement is available at: www.ellucian.com/privacy. Ellucian shall have the right to (a) use, store, process, modify, reproduce, distribute and display customer data, and to grant sublicenses to third parties, for the sole purposes of providing the software, performing Ellucian's obligations under its agreements with customers and complying with applicable law or legal requirements; (b) use, store, process, modify and reproduce customer data for Ellucian's internal business purposes, including development, diagnostic, forecasting, planning, analysis and corrective purposes in connection with the software, and for otherwise improving and enhancing the software; and (c) use, store, process, modify, reproduce, display, perform, distribute, disclose and otherwise exploit in any manner Aggregated Data for Ellucian's business purposes, including disclosure within its public statements and marketing materials describing or promoting Ellucian or the software.
    [Show full text]
  • FAQ 1-3GODR4 Banner 8 Pro*C ICU (International Components for Unicode) Installation and Configuration for Linux
    FAQ 1-3GODR4 Banner 8 Pro*C ICU (International Components for Unicode) Installation and Configuration for Linux This note provides steps for installing ICU (International Components for Unicode). ICU is required for Banner 8 Pro*C programs on Linux Red Hat 3 and 4. For For Red Hat Linux 5 see: FAQ 1-5EOZZS In the example commands in this note, ICU is installed on a Linux server as the Unix id root in the directory /usr/local/include The /usr/local/include will become your ICU_HOME and be referenced in the Banner Makefile_tm file. If in lieu of root you choose to use sudo (see man pages on sudo), be aware that environment variables set in the user's session may not be carried over into the sudo session. So if for example the LD_LIBRARY_PATH is set in the user's session, the sudo session may not have LD_LIBRARY_PATH set unless root's default profile already has LD_LIBRARY_PATH set. The directory /usr/local/include is recommended for the ICU installation directory since by default ICU will also create two additional directories under /usr/local/include called layout and unicode. =============================================================== ========================= Verify gmake is at a minumum of 3.77. GNU make can be downloaded from http://ftp.gnu.org/gnu/make/ On Red Hat Linux the gmake command is symbolically linked to make so either command can be used. Example: gmake --version GNU Make version 3.79.1, by Richard Stallman and Roland McGrath. Built for i386-redhat-linux-gnu =============================================================== ========================= For Red Hat Linux, verify the gcc compiler and g++ compiler are at a minimum version of 3.2.3 for Red Hat 3.0 and a minumum of 3.4.4 for Red Hat 4.0.
    [Show full text]
  • Wright State Prints Mission Critical Documents with Thin Clients from UNIX
    LEV I , RAY & SHOUP, IN C. CASE STUDY Wright State University Raising the banner of academic document management premier state university sought Telecomm Services. With operations extend the system's usefulness into the a reliable way to manage spanning help desk services, application future - all while keeping costs at a documents generated by their development, network, desktop, and reasonable level today.” Anew UNIX-based telecomm support, the CaTS team A key member of the team was system administrative system. After carefully plays an important role in nearly all administrator Steve Wynne. “For me, considering several vendor offerings, university functions. the support and reliability of the vendor university IT staff selected the VPSX ® Until recently, most of WSU's primary are just as important as the features of solution to provide assured, encrypted applications ran in the university's IBM their software,” says Wynne. “Banner delivery of academic and administrative mainframe environment, and were documents are becoming a crucial part information. updated in the 1990s using web front- of university operations, so our output end interfaces. For budgetary reasons, management system needs to deliver ORGANIZATION however, the university decided to flexibility, responsiveness, and high replace the custom-developed availability.” Named after the world-famous Wright mainframe applications with a popular brothers, Wright State University in UNIX-based academic software suite VPSX SOLUTION SETS THE Dayton, Ohio, called Banner. continues their CURVE spirit of Several vendors responded to Wright innovation. The FINDING A UNIX OUTPUT State's output management RFP. The university serves MANAGEMENT SOLUTION team immediately began evaluating nearly 17,000 WSU's Banner implementation includes various solutions against a defined list students, offering more than 100 modules for financial aid, payroll, and of criteria.
    [Show full text]