This is the official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system, including configuration options and best practices. The guide covers topics such as network security, user authentication, and access control, as well as security-related configuration options for various services and applications. It is intended for system administrators and security professionals who need to secure their Red Hat Enterprise Linux 7 systems.
FEATURES
ALTERNATIVES
Read-only FUSE driver for Apple File System with support for encrypted volumes and fusion drives on Linux.
OpenEDR is an open-source platform enhancing cybersecurity through real-time detection and analysis of cyber threats.
Monitor WMI consumers and processes for potential malicious activity
Heimdal Enterprise provides a unified cybersecurity platform with advanced network and endpoint security solutions, including threat hunting and privileged access management.
Symantec Enterprise Cloud provides comprehensive cybersecurity for large enterprises, with a focus on data-centric hybrid security and innovation in threat and data protection.
A modern tool for Windows kernel exploration and observability with a focus on security.
YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.
Webroot Endpoint Protection provides advanced cloud-based protection against malicious files, scripts, exploits, and URLs to keep businesses safe from cyberattacks.
PINNED

Mandos Brief Newsletter
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.

PTJunior
An AI-powered penetration testing platform that autonomously discovers, exploits, and documents vulnerabilities while generating NIST-compliant reports.

CTIChef.com Detection Feeds
A tiered cyber threat intelligence service providing detection rules from public repositories with varying levels of analysis, processing, and guidance for security teams.

ImmuniWeb® Discovery
ImmuniWeb Discovery is an attack surface management platform that continuously monitors an organization's external digital assets for security vulnerabilities, misconfigurations, and threats across domains, applications, cloud resources, and the dark web.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.