AnsweredAssumed Answered

Linux Policy Compliance Scanning - Authentication

Question asked by G K on Sep 16, 2014
Latest reply on Feb 11, 2016 by Herbon Lavera

Hi All,


I understand that in order for the policy compliance scanner to execute successfully for Linux, root or sudo to root, among other options are permitted. However, I was wondering if the scans would run successfully if sudo to certain commands was allowed and executed to gather config status.


In other words, can the scanner selectively return results for the configs it was able to verify (given the limited sudo access to commands) or does it fail because sudo to root was not enabled? Please suggest.