Hi, thank you so much for clarifying the context.
Regarding the check with ID 34025 that you displayed in the last message, I guess the SCA policy that was executed could be: cis_apple_macOS_14.0.yml
According to the check with ID 34025 the definition has 2 rules that both should pass to consider the result of the check as passed. Reference:
https://github.com/wazuh/wazuh/blob/v4.7.2/ruleset/sca/darwin/23/cis_apple_macOS_14.0.yml#L595-L620.
The rules for this check are:
- "c:fdesetup status -> r:^FileVault is On"
This executes the command:
fdesetup statusthen, tries to match in the output of the command the text starting with
FileVault is On- 'c:osascript -l JavaScript -e "osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName(''com.apple.MCX'').objectForKey(''dontAllowFDEDisable'')" -> r:^0$'
This executes the command:
osascript -l JavaScript -e "osascript -l JavaScript -e "$.NSUserDefaults.alloc.initWithSuiteName(''com.apple.MCX'').objectForKey(''dontAllowFDEDisable'')"then, tries to match in the output a literal line:
0According to the
condition: all clause, both condition has to pass to consider the check with ID 34025 as passed.
1. Could you check both are passing? Could you run and share the output of the commands in the host that is not passing that check?
2. Could you indicate what is the name of the SCA policy and details about the operating system that is using it?
References:
- Security Configuration Assessment:
https://documentation.wazuh.com/4.7/user-manual/capabilities/sec-config-assessment/index.html