By default, STIG compliance is disabled on Address Manager and DNS/DHCP Server
appliances and virtual machines. Once STIG compliance is enabled, however, you may want to
disable STIG compliance when working on a STIG-compliant configuration before deploying the
server, or if STIG-compliant features are enabled unintentionally.
To disable STIG compliance:
-
Log in to the Address Manager Administration Console as the
administrator.
-
From Main Session mode, type configure system and
press ENTER.
-
Type set stig-compliance disable and press
ENTER.
Proteus:configure:system> set stig-compliance disable
-
At the prompt, type
Y/y and press ENTER to confirm
your selection. The Address Manager server reboots to implement
the changes.
Note: With STIG compliance and auditing
disabled, you now have direct root access.