UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28987 SRG-OS-000265 SV-36978r1_rule Medium
Description
Configuration settings are the configurable security-related parameters of information technology products that are part of the information system. Security-related parameters are those parameters impacting the security state of the system including parameters related to meeting other security control requirements. Security-related parameters include registry settings; account, file, and directory settings (i.e., permissions); and settings for services, ports, protocols, and remote connections.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None