Security Guide Red Hat Enterprise Linux 7 Logo

Security Guide Red Hat Enterprise Linux 7

0
Free
Visit Website

This is the official security guide for Red Hat Enterprise Linux 7, providing detailed information on securing the operating system, including configuration options and best practices. The guide covers topics such as network security, user authentication, and access control, as well as security-related configuration options for various services and applications. It is intended for system administrators and security professionals who need to secure their Red Hat Enterprise Linux 7 systems.

FEATURES

ALTERNATIVES

OSSEC is a versatile HIDS known for its powerful log analysis and intrusion detection capabilities.

Santa is a binary and file access authorization system for macOS.

Absolute Security provides a comprehensive cybersecurity platform that offers endpoint-to-network access coverage, automated security compliance, and secure endpoint and access solutions.

SharpAppLocker provides a C# adaptation of the Get-AppLockerPolicy cmdlet for managing application control policies.

YARA-Endpoint is a client-server architecture tool that can be used for endpoint protection and incident response.

A collection of scripts to harden Windows 10 security and privacy

A simple ransomware protection that intercepts and kills malicious processes attempting to delete shadow copies using vssadmin.exe.

Code injection library for OS X with cross-architecture support.