By default, STIG compliance is disabled on Address Manager and DNS/DHCP Server appliances and virtual machines. Once STIG compliance is enabled,
however, you may want to disable STIG compliance when working on a STIG-compliant
configuration before deploying the server, or if STIG-compliant features are enabled
unintentionally. For more information on STIG compliance, refer to STIG.
To disable STIG compliance:
-
Log in to the Address Manager Administration Console as the
administrator.
-
From Main Session mode, type configure system and
press ENTER.
-
Type set stig-compliance disable and press
ENTER.
Proteus:configure:system> set stig-compliance disable
-
At the prompt, type
Y/y and press ENTER to confirm
your selection. The Address Manager server reboots to implement the
changes.
Note: With STIG compliance and auditing
disabled, you now have direct root access.