Search Exchange

Search All Sites

Nagios Live Webinars

Let our experts show you how Nagios can help your organization.

Contact Us

Phone: 1-888-NAGIOS-1
Email: sales@nagios.com

Login

Remember Me

Directory Tree

check_portaudit2

Rating
0 votes
Favoured:
0
Current Version
0.6.0
Last Release Date
2014-01-11
Compatible With
  • Nagios 2.x
  • Nagios 3.x
License
GPL
Hits
26630
Files:
FileDescription
check_portaudit.gzcheck_portaudit.gz
Nagios CSP

Meet The New Nagios Core Services Platform

Built on over 25 years of monitoring experience, the Nagios Core Services Platform provides insightful monitoring dashboards, time-saving monitoring wizards, and unmatched ease of use. Use it for free indefinitely.

Monitoring Made Magically Better

  • Nagios Core on Overdrive
  • Powerful Monitoring Dashboards
  • Time-Saving Configuration Wizards
  • Open Source Powered Monitoring On Steroids
  • And So Much More!
Nagios plugin to monitor vulnerable and/or obsolete packages installed on a FreeBSD system.
This plugin uses the built-in 'pkg' or the port installed 'pkg' utility on your FreeBSD system. This plugin will scan your system for vulnerable packages or obsolete packages - and display appropriate warnings to Nagios.

Usage: check_portaudit (security/updates) (show/hide) [database age limit (days)]
Example: check_portaudit security show 3

COMMANDS
security - displays vulnerable packages.
updates - lists packages which need updating.

You can choose whether to show or not show vulnerable/old packages by name. The message line may be incredibly huge if you have a lot of old/vulnerable packages, so using "noshow" you are guaranteed a single line of text.

DISPLAY
show - shows all packages by name when vulnerable/obsolete packages detected
noshow - do not show package names. Simply display number of packages detected

DATABASE AGE LIMIT
The database age limit option will produce CRITICAL errors by default if either the portaudit database or the ports tree is older than a certain number of days. If this argument is not specified, the default will be 7 days.

WARNINGS will be delivered should old/vulnerable packages be discovered otherwise you will get an OK result.