I copied over this from another host (same results):
=
# Welcome to the chrony configuration file. See chrony.conf(5) for more
# information about usuable directives.
# This will use (up to):
# - 4 sources from ntp.ubuntu.com which some are ipv6
Public bug reported:
Source: CIS_Ubuntu_Linux_20.04_LTS_Benchmark_v1.1.0.pdf
Link: https://workbench.cisecurity.org/files/3228 (download PDF)
cis-audit level2_server fails on rule_CIS-2.2.1.3 but passes all manual
checks.
===
Title Ensure chrony is configured
Rule xccdf_com.ubunt
Hi, thanks for the suggestion. I can confirm that works (manual
intervention). Files attached.
The reason for the manual addition originally is that the hardening
script failed to touch the files and add the lines as per the code
snippet. I just used a fresh image as a test, same result from de
Please find attached.
** Attachment added: "common-account.txt"
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1942010/+attachment/5522351/+files/common-account.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ub
Please find attached.
** Attachment added: "common-auth.txt"
https://bugs.launchpad.net/ubuntu/+source/ubuntu-advantage-tools/+bug/1942010/+attachment/5522352/+files/common-auth.txt
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Tags added: cis-audit
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1942010
Title:
Ensure lockout for failed password attempts is configured
To manage notifications about this bug go to:
https:/
Public bug reported:
Source: CIS_Ubuntu_Linux_20.04_LTS_Benchmark_v1.1.0.pdf
Link: https://workbench.cisecurity.org/files/3228 (download PDF)
cis-audit level2_server fails on rule_CIS-5.3.2 but passes all manual checks.
===
Title Ensure lockout for failed password attempts is