[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

251139

 
 

909

 
 

196159

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 30475 Download | Alert*

MacOS's audit facility, auditd, receives notifications from the kernel when certain system calls, such as open, fork, and exit, are made. These notifications are captured and written to an audit log. Rationale:Logs generated by auditd may be useful when investigating a security incident as they may help reveal the vulnerable application and the actions taken by a malicious actor. Rem ...

The socketfilter Firewall is what is used when the Firewall is turned on in the Security and Privacy Preference Pane. In order to appropriately monitor what access is allowed and denied, logging must be enabled.The logging level must be set to "detailed" to be useful in monitoring connection attempts that the firewall detects. Throttled login is not sufficient for examining Firewall conn ...

Safari will automatically run or execute what it considers safe files. This can include installers and other files that execute on the operating system. Safari evaluates file safety by using a list of filetypes maintained by Apple.The list of files include text, image, video and archive formats that would be run in the context of the OS rather than the browser. Rationale:Hackers have taken ...

Attackers use websites with malicious or unwanted content to exploit the user or the computer. Part of the attack chain is to lure someone to load their content rather than the desired content. In order to reduce the risk in interacting with unwanted content, the full website address should always be displayed in Safari. Rationale: Full visibility into what site is being visited is importa ...

Secure Keyboard Entry prevents other applications on the system and/or network from detecting and recording what is typed into Terminal. Unauthorized applications and malicious code could intercept keystrokes entered in the Terminal. Rationale: Enabling Secure Keyboard Entry minimizes the risk of a key logger detecting what is entered in Terminal. Impact: Enabling this in Terminal wo ...

Software vendors release security patches and software updates for their products when security vulnerabilities are discovered. There is no simple way to complete this action without a network connection to an Apple software repository. Please ensure appropriate access for this control. This check is only for what Apple provides through software update.Software updates should be run at minimum eve ...

Ensure that application updates are installed after they are available from Apple. These updates do not require reboots or administrator privileges for end users. Rationale: Patches need to be applied in a timely manner to reduce the risk of vulnerabilities being exploited. Impact: Unpatched software may be exploited. Remediation: Profile Method: Create or edit a configuration ...

Apple provides the capability to manage software updates on Apple devices through mobile device management. Part of those capabilities permit organizations to defer software updates and allow for testing. Many organizations have specialized software and configurations that may be negatively impacted by Apple updates. If software updates are deferred, they should not be deferred for more tha ...

Starting with macOS 13.1 (Ventura) Apple has made a collaboration tool (Freeform) available on macOS, iOS and iPadOS. This application allows for extensive whiteboard creation and sharing using iCloud. Organizations may want to audit the use of Freeform iCloud sharing of internally created boards. Rationale:Internally created whiteboards may not be authorized to share to external contact th ...

This setting provides the user an understanding of the current status of Location Services and which applications are using it. Rationale:Apple has fully integrated location services into macOS. Where the computer is currently located is used for Timezones, weather, travel times, geolocation, "Find my Mac," and advertising services. This benchmark recommends that location services ...


Pages:      Start    1    2    3    4    5    6    7    8    9    10    11    12    13    14    ..   3047

© SecPod Technologies