In this hands-on lab, we will use the SCAP Workbench tool to create a custom policy and scan a host with it. SCAP Workbench comes with preconfigured rule sets, from which we can create our own custom policies we’ll use to scan our environment for compliance with internal security policies.
*This course is not approved or sponsored by Red Hat.*
Successfully complete this lab by achieving the following learning objectives:
- Create a Custom OpenSCAP Policy
Use VNC to connect to the lab server using it’s public IP address on port 5901.
Open SCAP Workbench:
- Applications > System Tools > SCAP Workbench
Select RHEL7 next to Select content to load:.
Click the Customize button next to Profile.
Provide a New Profile ID of
In the customizing window:
- Click the Deselect All button at the top.
- Under Services > Obsolete Services > Telnet, check the box next to Uninstall telnet-server Package.
- Under Services > FTP Server > Disable vsftpd if Possible, check the box next to Uninstall vsftpd Package.
- Under System Settings > Network Configurations and Firewalls > firewalld > Inspect and Activate Default firewalld Rules, check the box next to Verify firewalld Enabled and Install firewalld.
Click the OK button at the bottom of the customization window.
Now, in the SCAP Workbench window, click on File, Save Customization Only, and name the customization
- Scan the Localhost with a Custom Profile
From within the SCAP Workbench window, select Local Machine as the target, and then click the Scan button at the bottom to start a scan using the custom profile.
Once the scan finished, click the Close button in the Diagnostics window.
Click the Save Results button at the bottom, and select HTML Report.
scan_results.htmlas the name of the report, and click Save.