Release notes for version 1.3.9.1221
No Type Description --- ----- ---------------------------------- 1 CODE The Manage Check screen has been modified to prevent free text intput in the code, encrypted, main and check drop down boxes. 2 CHECK Audit Information policy ammended to work with 9.2 for a customer for platform checks 3 CHECK Audit Information policy ammended to work with 9.2 for a customer for architecture checks 4 CHECK Audit Information policy ammended to work with 9.2 for a customer for license details check 5 CHECK Audit Pre-Emp policy modified to work with 9.2 for a customer for registered components 6 CHECK Audit Pre-Emp policy modified to work with 9.2 for a customer for license maximums 7 CHECK Audit Pre-Emp policy modified to work with 9.2 for a customer for feature usage statistics 8 CHECK Audit Pre-Emp policy modified to work with 9.2 for a customer for high watermark statistics 9 CHECK Library check check_parameter fixed for date comparison which was >= and should be <= 10 CHECK Programing policy fixed for plsql_92_wrap_format to specify minimum version of 11 for availability 11 CODE Manage Check screen changed to provide a full screen editor for the developer notes field which is used in the development of libraries 12 CHECK The parameter library check has been updated to clarify the use of the date parameter. 13 CHECK Parameter policy; the version range clarified for serializable to work for 10 - 12c 14 CHECK Parameter policy; the version range clarified for row_locking to work for 10 - 12c 15 CHECK Parameter policy; the version range clarified for case sensitive passwords to work for versions below 11g 16 CHECK Parameter policy; the version range clarified for global failed logins to work for versions below 11g 17 CHECK Parameter policy; the version range clarified for bad packet action to work for versions below 11g 18 CHECK Parameter policy; the version range clarified for network trace action to work for versions below 11g 19 CHECK Parameter policy; the version range clarified for server release banner to work for versions below 11g 20 CHECK Parameter policy; the version range clarified for diagnostic destination to work for versions below 11g 21 CHECK Backup policy; the version range clarified for transaction audit values to work for versions above 9.2 22 CHECK Network policy; xml http listener check changed to work for 9.2 for a customer 23 CHECK Network policy; xml ftp listener check changed to work for 9.2 for a customer 24 INSTALL CPU {n} figure added to the PFCL.config file to make the {n} figure configurable by the customer rather than hard coded. 25 CHECK Versions and patches policy; The existing patch check has been modified to work with 9.2 for a customer where there is no dba_registry_history table. 26 CHECK Versions and patches policy; new n-d check added controlled by the PFCL.config file where the customer can specify the period of {n} now. 27 CHECK Audit Information policy; New check added to calculate the ORACLE_HOME or to substitute the value from PFCL.config if it was specified. 28 INSTALL The AuditLinux project template has been updated to include the latest database checks as well as the latest OS checks 29 DOC Product documentation updated to include details of privileges required for 12c scanner users 30 CHECK Password Cracker policy; New check added to test if SYS account is open 31 CHECK Password Cracker Policy; New check added to test if SYSTEM account is open 32 CODE New variable added {{diffplusone}} to the "repo" report tool to allow a customer to count errors (failed checks) at their check report level when a their check may use multiple PFCLScan checks 33 CODE Documented new repo variable {{diffplusone}} 34 CHECK Passwords and data policy; title clarified for 10g export links 35 CODE Two new short cut variables added for "repo" for {{assign}} and {{varoff}}. These are template variables and classed as undocumented. 36 CODE Two new shortcut variables added for "repo" for {{loop}} and {{endloop}}. These are template variables and undocumented. 37 CODE One new shortcut variable added for "repo" for {{check:}}. This is a template variable and is classed as undocumented 38 CHECK Password Cracking policy; the check for global failed logins now takes into account the PFCL.config value provided by the customer 39 CHECK Object policy; Added new check for access to DBA_JOBS 40 CHECK Object policy; Added new check for access to DBA_SCHEDULER_JOBS 41 CHECK Audit Information policy; text ammended for links check 42 CHECK Network policy; the test for PUBLIC database links has been redefined 43 CHECK Network policy; new test added to look for links, private and public that connect to Oracle users 44 CHECK Audit Privileges policy; The check for SYSDBA has been changed to only report on SYSDBA where it is granted to a non-SYS user 45 CHECK Audit privileges policy; new seperate check added for SYSOPER rather than the previous joint check. 46 CHECK Pre-Emptive Policy; Added new check to establish existing default directory objects in the database 47 CHECK File system policy; default DIRECTORY object check changed to use a pre-defined check rather than a hard coded list. 48 CHECK File system policy; customer installed DIRECTORY object check changed to use a pre-defined check rather than a hard coded list 49 CHECK File system policy; the check for default DIRECTORY objects is made a PRE status check not a normal for error check 50 CHECK Audit Information policy; A new check has been added to obtain the ORACLE_BASE directory from the database. 51 DOC Documentation updated to clarify the use of single row variables in multi row results in pre-conditions. This is added to the notes section 52 CHECK File system policy; new check added that tests for access to directory objects that allow access to the Oracle software 53 CHECK Audit configuration; new check added to test if the audit_file_dest is within the ORACLE_HOME or ORACLE_BASE 54 CHECK Audit configuration policy; Added new check to test that audit of CREATE SESSION is enabled for all users. 55 CHECK Audit configuration policy; Added new check to test if audit of GRANT ANY ROLE is enabled for all users. 56 CHECK Audit configuration policy; added new check to test if audit of GRANT ANY PRIVILEGE is enabled for all users. 57 CHECK Audit configuration policy; Added new check to test if audit of GRANT ANY OBJECT privilege is enabled for all users 58 CHECK Audit configuration policy; Added new check to test for audit USER enabled for all users. 59 INSTALL Additional policy added for AuditLinux template set to allow different Unix's to be processed by the same polcy sets via a mapping mechanism 60 INSTALL New policy osprocess added to the installation 61 CHECK Initialisation check added to the OS Process policy 62 DOC Added specification for the required Unix user privileges when executing a Oracle/Linux policy set audit 63 CHECK Audit parameters policy; Added a check for 12c to show the threaded model used. 64 CHECK Audit User privileges; External user check defined to test both external users where external authentication is defined and also external users who have dual authentication 65 CHECK Audit User Privileges; Added a check to test the number of customers roles for granularity against a PFCL.config input value 66 CHECK Audit User Privileges; The check for the grant of "all privileges" has been redefined. 67 INSTALL Changed config file to include a count of customer DBA roles. 68 CHECK Audit privilege access policy; new check added for existance of customer defined DBA role specified in the PFCL.config file 69 INSTALL Changed config file to include count of custom DBA users 70 CHECK Audit privilege access policy; new check added to test that customer DBA users defined in the PFCL.config have been created in the database. 71 CHECK Deep Analysis 1 policy; added check to test if the customer defined DBA users have been granted the DBA role 72 CHECK Audit Privilege access policy; Added a new check to locate all users granted the custom DBA roles defined in the PFCL.config file 73 CHECK Deep Analysis 1 policy; Added new check that locates any non customer DBA who has been granted the customer DBA account 74 CHECK Audit access privileges policy; Custom DBA user and custom DBA role modified to correct case sensitivity 75 INSTALL New code library policy added to allow template based checks for code vulnerabilities to be tested. 76 CHECK code library; library check added to allow queries against dba_source to be templated.