Showing results for 
Show  only  | Search instead for 
Did you mean: 
Former Member
Not applicable
Report Inappropriate Content
Message 1 of 1

LinuxShield 1.6.0 on RHEL5 with SELinux enforcing

We're using LinuxShield 1.6.0 on a RHEL5 platform with SELinux enforcing.  When an on-demand scan is scheduled or deleted the /etc/crontab file is updated.  The update is changing the SELinux enforcing context from system_cron_spool_t to etc_t which keeps the cron.hourly, cron.weekly and orher crons in this file from executing.  One must run the restorecon program on /etc/crontab to restore the context to system_cron_spool_t.  How do I prevent scheduling/deleting on-demand scans from changing the context of the /etc/crontab file?

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community