CLEANACCESS Archives

November 2005

CLEANACCESS@LISTSERV.MIAMIOH.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Grzeczka, Timothy J." <[log in to unmask]>
Reply To:
Perfigo SecureSmart and CleanMachines Discussion List <[log in to unmask]>
Date:
Mon, 21 Nov 2005 13:51:15 -0600
Content-Type:
text/plain
Parts/Attachments:
text/plain (33 lines)
Of course,

Under the Network Scanner tab, under the "MAC_ALL" group we have the
following checked:

MacOS X Local Security Checks
	[12257] Multiple MacOS X vulnerabilities
	[12521] MacOS X Version

The first check verifies that the user is running at least Mac OS 10.3.4
due to the remote system exploit in earlier versions. The second check
is an information scan. It verifies that the user has all the latest
patches for OS X. 

If you enable these checks, be sure that you make an ends with rule for
.apple.com in your trusted domains for both the temporary and quarantine
role. All the user has to do then is run the Software Update service in
OS X, which is located under the Blue Apple menu at the top of the
screen on their Mac.

I just did a quick check and we have about 20 Mac users on CCA right
now. All but one is OS X, and they all passed successfully. This term, I
have had only one user trip the 1st check. She ran Software Update,
rebooted, and signed in with no problems.

 
Timothy Grzeczka
Network Analyst
Dominican University
[log in to unmask]
Voice - (708) 524-6568
Fax - (708) 488-5111

ATOM RSS1 RSS2