By default, STIG compliance is disabled on Address Manager and DNS/DHCP Server
appliances and virtual machines. Once STIG compliance is enabled, however, you may want to
disable STIG compliance when working on a STIG-compliant configuration before deploying the
server, or if STIG-compliant features are enabled unintentionally.
To disable STIG compliance:
-
Log in to the Address Manager Administration Console as the
administrator. For more information on default login credential for Address
Manager, refer to BlueCat default login credentials (you must be
authenticated to view this topic).
-
From Main Session mode, type configure system and
press ENTER.
-
Type set stig-compliance disable and press
ENTER.
Proteus:configure:system> set stig-compliance disable
-
At the prompt, type
Y/y and press ENTER to confirm
your selection. The Address Manager server restarts to implement
the changes.
Note: With STIG compliance and auditing
disabled, you now have root access.