Skip to main content

This document describes best practices and standards for configuring a Red Hat Enterprise Linux 7 system on the network to comply with the University Information Security Policy.

The following scripts can be used to configure the system.


Monthly Vulnerability Scanning

The UNC Information Security Policy requires Monthly Vulnerability Scanning for all “mission critical” or “sensitive” systems.

This document describes how to configured authenticated Qualys scans on Linux

For convenience you can run the script

Incident Management Plan

Basic Security Awareness For End Users

All affiliates are responsible for completing the annual training module at

Formal Administrator Security Training

Anyone with root privilege (i.e., members of wheel; able to su or sudo) should register as a system administrator at and enroll/complete the training through sakai

Comments are closed.