The most recent content from our members.
All, Step 1. Configure your Custom Properties You will need to configure two different Custom Properties (CP)to let SolarWinds be able to decipher between the different types of devices and the operating system running on them. Navigate to the following location: Settings > All Settings > Manage Custom Properties. The…
I need to be able to limit the number of simultaneous sessions to the web server (tomcat) on WHD. I've tried a couple of different context.xml files, but nothing is really working.
I have searched the Thwack community and found a few posts that provide bits of information, so I wanted to see if there was a single source guidance document or site that will provide guidance for configuring a Network Management System (NPM, NTA, EOC, UDT Modules) for STIG compliance. The boxes in question are utilizing:…
Introduction This page will be the Main Page for all DISA STIG information provided by CourtesyIT. The intent is to follow this page to alert you to new content and discussions about being DISA STIG Compliant. Please feel free to message me if you would like any STIG\Vendors packages developed that are not listed here.…
What date will LEM support snmp v3? My company uses DOD requirements for all network gear. Right now LEM is not compliant. As we are in the testing phase we also realized we cannot change the port for syslog. If this was possible this would be a band-aid fix until LEM did support snmp v3. Currently with snmp v2 my company…
Thank you for choosing this document. You will need to supply vendor specific CLI or Regular expression statements for these checks. These reports will trigger for all Vendor devices that equal "Cisco" This file was uploaded from the "Shared on Thwack" Tab via NCM Compliance tree. Thanks and stay tuned........... Cisco…
Information security is important to every organization, but when it comes to government agencies, security can be considered the priority. A breach or loss of information held by federal agencies can lead to major consequences that can even affect the national and economic security of the nation. The Defense Information…
Understanding Compliance If data in your network relates to employee or customer medical records, or to your company’s finances—either in terms of revenue or reporting—then most likely you must comply with federal law (HIPAA, Sarbanes-Oxley). Similarly, for all federal agencies and organizations, the National Standards and…
One of the selling points of this product was "out of the box assessment templates" "supports industry standards like DISA STIG". So.. where are they, I have searched and find some checks that users have posted in the forums. But out of the box means I take the product out of the box and it has these templates available.…
So.. I am trying to create a new rule to make sure port security is enabled on all ports on all switches. I can have it look for the string, "switchport port-security" but if it finds it 1 time it states the switch is compliant. How to I have it check each interface to make sure it is enabled on ALL switch ports. Also,…
It looks like you're new here. Sign in or register to get started.