Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

scap-workbench(20) [centos man page]

scap-workbench(20)					  System Administration Utilities					scap-workbench(20)

scap-workbench - GUI tool for systems compliance evaluation SYNOPSIS
scap-workbench is GUI tool for security compliance checking. Compliance can be described with SCAP standards - XCCDF and OVAL. This tool enables users to: * evaluate local and/or remote machines using SCAP content (scanning) * perform remediation on both local and remote machines (remediation) * adjust XCCDF scanning profiles (tailoring) OPTIONS
XCCDF_FILE If this parameter is provided the scanner will immediately open given XCCDF or source datastream (SDS) file after it starts. SCAP CONTENT
Sample content is provided by the OpenSCAP project (in the openscap-content package). Other sources of SCAP content are: National Vulnerability Database - Red Hat content repository - scap-security-guide project - sce-community-content project - AUTHORS
Martin Preisler <> NOTES
scap-workbench uses the OpenSCAP library, see SEE ALSO
oscap(8) Red Hat Sep 2013 scap-workbench(20)

Check Out this Related Man Page

FIREWALL-CONFIG(1)						  firewall-config						FIREWALL-CONFIG(1)

firewall-config - firewalld GUI configuration tool SYNOPSIS
firewall-config [OPTIONS...] DESCRIPTION
firewall-config is a GUI configuration tool for firewalld. OPTIONS
firewall-config does not support any special options. The only options that can be used are the general options that Gtk uses for Gtk application initialization. For more information on these options, please have a look at the runtime documentation for Gtk. The following options are supported: -h, --help Prints a short help text and exists. SEE ALSO
firewall-applet(1), firewalld(1), firewall-cmd(1), firewall-config(1), firewalld.conf(5),, firewalld.icmptype(5), firewalld.lockdown-whitelist(5), firewall-offline-cmd(1), firewalld.richlanguage(5), firewalld.service(5),, firewalld.zones(5) NOTES
firewalld home page at More documentation with examples: AUTHORS
Thomas Woerner <> Developer Jiri Popelka <> Developer firewalld 0.3.9 FIREWALL-CONFIG(1)
Man Page

15 More Discussions You Might Find Interesting

1. Cybersecurity

VPN client for linux?...

I'm looking for an open source VPN client that I can set up on RedHat 7.1. Any suggestion? Thanks in advance. VJ :) (3 Replies)
Discussion started by: vancouver_joe
3 Replies

2. UNIX for Advanced & Expert Users

Possible GUI to Command-Line Interface Translator?

I was chatting with my teacher on how this could be a great tool for admins who are making the switch from GUI to CLI administration. I'm wondering, does this kind of tool exist? (4 Replies)
Discussion started by: Daemon-Killer
4 Replies

3. AIX

View lastest content in the file

Hi, May i know how can i view the lastest content of the log file. Currently, i use the "more" command : more logfile However, it will give me the content last year first and i had to keep using the space bar to move down to the lastest content for current date. How can i view the lastest... (3 Replies)
Discussion started by: Lauran Kerry
3 Replies

4. HP-UX

small ? on /etc/default/security edit?

Hi all, Has anyone ever been burned by editing /etc/default/security with vi? or should this only be edited inside of SAM or some such tool? I want to turn on /etc/nologin as a tool to lock out all users but keep my system in multi mode for DB maintenance. TIA -KJ PS I have been... (3 Replies)
Discussion started by: KmJohnson
3 Replies

5. UNIX for Dummies Questions & Answers

Formating/inserting the content

Hi All, I have a two different files with below informations. First file contains the content are as below: Second file contents are as below: Now the problem is i need to insert the respective file name and status infomration from the second file into the first file exactly next to... (7 Replies)
Discussion started by: vino_hymi
7 Replies

6. Cybersecurity

How were UNIX machines taken over by SPAMMERS?

Hello, Three of our machines at work were sending out SPAM on the internet. 2 of them were so old I knew that the hackers just exploited the vulnerabilities in the old systems. The cause of concern is that one one of the machines is a new Centos 5.3 box.The only proof we have is that 4-6 emails... (3 Replies)
Discussion started by: mojoman
3 Replies

7. AIX

check web content - Ksh

Hi everybody! I wonder if I could see some text content of a website, via command line... That could be very helpful, in order to automatize a lot of projects im working on. thx a lot (2 Replies)
Discussion started by: Datinsky
2 Replies

8. Red Hat

Meaning of SDA

Hey everyone. Right now I am working through Red Hat's online storage reconfiguration guide for a project that we're working on. For removing storage paths to a volume using multipaths, it says that the first step is to type: echo offline> /sys/block/sda/device/state Does it actually mean SDA?... (2 Replies)
Discussion started by: msarro
2 Replies

9. Programming

File content handling in c

HI, I have a file with the following content like --------filename----------- this is a tool end --------filename----------- this is a tool this is a box end --------filename----------- these are tools these are boxes this is one end i want to write the content to another file as... (6 Replies)
Discussion started by: jhon1257
6 Replies

10. Shell Programming and Scripting

Help with duplicate common data content

Input file: #data_131 0 >content..._* 1 >content..._at_+/97.20% #data_137 0 >content..._* 1 >content..._at_+/97.20% 2 >seq..._* 3 >content..._at_+/97.20% 4 >content..._at_+/97.20% #data_141 0 >content..._* #data_150 0 >content..._* 1 >content..._at_+/97.20% 2 >seq..._* 3... (3 Replies)
Discussion started by: perl_beginner
3 Replies

11. UNIX for Dummies Questions & Answers

Mysql GUI tool?

Hi, I am looking for GUI based tool for Mysql. I found few but I need to pay for them to get the license. Since I work for mom & pop company, they don't have any money. :-( I was wondering if you guys know any good GNU tool out there? I get the data on the email, I was wondering if I... (3 Replies)
Discussion started by: samnyc
3 Replies

12. Cybersecurity

PCI DSS Compliance : Insecure Communication Has Been Detected

From the nessus scanner tool report i got below vulnerability PCI DSS Compliance : Insecure Communication Has Been Detected As per the description given in above link - I am not able to understand How to find insecure port... (2 Replies)
Discussion started by: saurabh84g
2 Replies

13. UNIX for Advanced & Expert Users

Recruiting for an open source project

I am posting this gauge the level of interest among the community in forming an open source team to work on an automation harness I am about to make available. I already have a working POC running at my place of work, but it is not secure enough for production environments. However, I am about... (6 Replies)
Discussion started by: steadyonabix
6 Replies

14. UNIX for Advanced & Expert Users

How to find remote IP addresses that applications are scanning them?

Hi, I have a web server running on Debian 6.0.4 in a computer outside my university, but the web URL is blocked by my university, the security group of the university said because it was scanning computers inside university. I could not find any applications in my web server are doing... (3 Replies)
Discussion started by: hce
3 Replies

15. UNIX for Beginners Questions & Answers

Turn off exec 2>${_ERRORFILE} > ${_LOGFILE} feature?

Hi Folks - To make a long story short, this script is loaded into a workbench, executed via workbench user interface, and then I need to display the output on screen. However, I'm using the functions to direct stdout and stderror to their respective directories. Is there a way to turn that... (5 Replies)
Discussion started by: SIMMS7400
5 Replies

Featured Tech Videos