By default, STIG compliance is disabled on Address Manager and DNS/DHCP Server appliances and virtual machines. Once STIG compliance is enabled, however, you may want to disable STIG compliance when working on a STIG-compliant configuration before deploying the server, or if STIG-compliant features are enabled unintentionally. For more information on STIG compliance, refer to STIG.
To disable STIG compliance:
- Log in to the Address Manager Administration Console as the administrator.
- From Main Session mode, type configure system and press ENTER.
Type set stig-compliance disable and press
Proteus:configure:system> set stig-compliance disable
At the prompt, type
Y/y and press ENTER to confirm
your selection. The Address Manager server reboots to implement the
Note: With STIG compliance and auditing disabled, you now have direct root access.