By default, STIG compliance is disabled on Address Manager and DNS/DHCP Server appliances and virtual machines. Once STIG compliance is enabled, however, you may want to disable STIG compliance when working on a STIG-compliant configuration before deploying the server, or if STIG-compliant features are enabled unintentionally.
To disable STIG compliance:
- Log in to the Address Manager Administration Console as the administrator. For more information on default login credential for Address Manager, refer to BlueCat default login credentials (you must be authenticated to view this topic).
- From Main Session mode, type configure system and press ENTER.
Type set stig-compliance disable and press
Proteus:configure:system> set stig-compliance disable
At the prompt, type
Y/y and press ENTER to confirm
your selection. The Address Manager server restarts to implement
Note: With STIG compliance and auditing disabled, you now have root access.