. /** * Lang strings * * @package report * @subpackage security * @copyright 2008 petr Skoda * @license http://www.gnu.org/copyleft/gpl.html GNU GPL v3 or later */ $string['configuration'] = 'Configuration'; $string['description'] = 'Description'; $string['details'] = 'Details'; $string['check_configrw_details'] = '
It is recommended that the file permissions of config.php are changed after installation so that the file cannot be modified by the web server. Please note that this measure does not improve security of the server significantly, though it may slow down or limit general exploits.
'; $string['check_configrw_name'] = 'Writable config.php'; $string['check_configrw_ok'] = 'config.php can not be modified by PHP scripts.'; $string['check_configrw_warning'] = 'PHP scripts may modify config.php.'; $string['check_cookiesecure_details'] = 'If you enable https communication it is recommended that you also enable secure cookies. You should also add permanent redirection from http to https.
'; $string['check_cookiesecure_error'] = 'Please enable secure cookies'; $string['check_cookiesecure_name'] = 'Secure cookies'; $string['check_cookiesecure_ok'] = 'Secure cookies enabled.'; $string['check_defaultuserrole_details'] = 'All logged in users are given capabilities of the default user role. Please make sure no risky capabilities are allowed in this role.
The only supported legacy type for the default user role is Authenticated user. The course view capability must not be enabled.
'; $string['check_defaultuserrole_error'] = 'The default user role "{$a}" is incorrectly defined!'; $string['check_defaultuserrole_name'] = 'Default role for all users'; $string['check_defaultuserrole_notset'] = 'Default role is not set.'; $string['check_defaultuserrole_ok'] = 'Default role for all users definition is OK.'; $string['check_displayerrors_details'] = 'Enabling the PHP setting display_errors
is not recommended on production sites because error messages can reveal sensitive information about your server.
It is recommended that an email confirmation step is required when users change their email address in their profile. If disabled, spammers may try to exploit the server to send spam.
Email field may be also locked from authentication plugins, this possibility is not considered here.
'; $string['check_emailchangeconfirmation_error'] = 'Users may enter any email address.'; $string['check_emailchangeconfirmation_info'] = 'Users may enter email addresses from allowed domains only.'; $string['check_emailchangeconfirmation_name'] = 'Email change confirmation'; $string['check_emailchangeconfirmation_ok'] = 'Confirmation of change of email address in user profile.'; $string['check_embed_details'] = 'Unlimited object embedding is very dangerous - any registered user may launch an XSS attack against other server users. This setting should be disabled on production servers.
'; $string['check_embed_error'] = 'Unlimited object embedding enabled - this is very dangerous for the majority of servers.'; $string['check_embed_name'] = 'Allow EMBED and OBJECT'; $string['check_embed_ok'] = 'Unlimited object embedding is not allowed.'; $string['check_frontpagerole_details'] = 'The default frontpage role is given to all registered users for frontpage activities. Please make sure no risky capabilities are allowed for this role.
It is recommended that a special role is created for this purpose and a legacy type role is not used.
'; $string['check_frontpagerole_error'] = 'Incorrectly defined frontpage role "{$a}" detected!'; $string['check_frontpagerole_name'] = 'Frontpage role'; $string['check_frontpagerole_notset'] = 'Frontpage role is not set.'; $string['check_frontpagerole_ok'] = 'Frontpage role definition is OK.'; $string['check_google_details'] = 'The Open to Google setting enables search engines to enter courses with guest access. There is no point in enabling this setting if guest login is not allowed.
'; $string['check_google_error'] = 'Search engine access is allowed but guest access is disabled.'; $string['check_google_info'] = 'Search engines may enter as guests.'; $string['check_google_name'] = 'Open to Google'; $string['check_google_ok'] = 'Search engine access is not enabled.'; $string['check_guestrole_details'] = 'The guest role is used for guests, not logged in users and temporary guest course access. Please make sure no risky capabilities are allowed in this role.
The only supported legacy type for guest role is Guest.
'; $string['check_guestrole_error'] = 'The guest role "{$a}" is incorrectly defined!'; $string['check_guestrole_name'] = 'Guest role'; $string['check_guestrole_notset'] = 'Guest role is not set.'; $string['check_guestrole_ok'] = 'Guest role definition is OK.'; $string['check_mediafilterswf_details'] = 'Automatic swf embedding is very dangerous - any registered user may launch an XSS attack against other server users. Please disable it on production servers.
'; $string['check_mediafilterswf_error'] = 'Flash media filter is enabled - this is very dangerous for the majority of servers.'; $string['check_mediafilterswf_name'] = 'Enabled .swf media filter'; $string['check_mediafilterswf_ok'] = 'Flash media filter is not enabled.'; $string['check_noauth_details'] = 'The No authentication plugin is not intended for production sites. Please disable it unless this is a development test site.
'; $string['check_noauth_error'] = 'The No authentication plugin cannot be used on production sites.'; $string['check_noauth_name'] = 'No authentication'; $string['check_noauth_ok'] = 'No authentication plugin is disabled.'; $string['check_openprofiles_details'] = 'Open user profiles can be abused by spammers. It is recommended that eitherForce users to log in for profiles
or Force users to log in
are enabled.';
$string['check_openprofiles_error'] = 'Anyone can may view user profiles without logging in.';
$string['check_openprofiles_name'] = 'Open user profiles';
$string['check_openprofiles_ok'] = 'Login is required before viewing user profiles.';
$string['check_passwordpolicy_details'] = 'It is recommended that a password policy is set, since password guessing is very often the easiest way to gain unauthorised access. Do not make the requirements too strict though, as this can result in users not being able to remember their passwords and either forgetting them or writing them down.
'; $string['check_passwordpolicy_error'] = 'Password policy not set.'; $string['check_passwordpolicy_name'] = 'Password policy'; $string['check_passwordpolicy_ok'] = 'Password policy enabled.'; $string['check_riskadmin_detailsok'] = 'Please verify the following list of system administrators:
{$a}'; $string['check_riskadmin_detailswarning'] = 'Please verify the following list of system administrators:
{$a->admins}It is recommended to assign administrator role in the system context only. The following users have (unsupported) admin role assignments in other contexts:
{$a->unsupported}'; $string['check_riskadmin_name'] = 'Administrators'; $string['check_riskadmin_ok'] = 'Found {$a} server administrator(s).'; $string['check_riskadmin_unassign'] = '{$a->fullname} ({$a->email}) review role assignment'; $string['check_riskadmin_warning'] = 'Found {$a->admincount} server administrators and {$a->unsupcount} unsupported admin role assignments.'; $string['check_riskbackup_detailsok'] = 'No roles explicitly allow backup of user data. However, note that admins with the "doanything" capability are still likely to be able to do this.'; $string['check_riskbackup_details_overriddenroles'] = 'These active overrides give users the ability to include user data in backups. Please make sure this permission is necessary.
{$a}'; $string['check_riskbackup_details_systemroles'] = 'The following system roles currently allow users to include user data in backups. Please make sure this permission is necessary.
{$a}'; $string['check_riskbackup_details_users'] = 'Because of the above roles or local overrides, the following user accounts currently have permission to make backups containing private data from any users enrolled in their course. Make sure they are (a) trusted and (b) protected by strong passwords:
{$a}'; $string['check_riskbackup_editoverride'] = '{$a->name} in {$a->contextname}'; $string['check_riskbackup_editrole'] = '{$a->name}'; $string['check_riskbackup_name'] = 'Backup of user data'; $string['check_riskbackup_ok'] = 'No roles explicitly allow backup of user data'; $string['check_riskbackup_unassign'] = '{$a->fullname} ({$a->email}) in {$a->contextname}'; $string['check_riskbackup_warning'] = 'Found {$a->rolecount} roles, {$a->overridecount} overrides and {$a->usercount} users with the ability to backup user data.'; $string['check_riskxss_details'] = 'RISK_XSS denotes all dangerous capabilities that only trusted users may use.
Please verify the following list of users and make sure that you trust them completely on this server:
{$a}
'; $string['check_riskxss_name'] = 'XSS trusted users'; $string['check_riskxss_warning'] = 'RISK_XSS - found {$a} users that have to be trusted.'; $string['check_unsecuredataroot_details'] = 'The dataroot directory must not be accessible via web. The best way to make sure the directory is not accessible is to use a directory outside the public web directory.
If you move the directory, you need to update the $CFG->dataroot
setting in config.php
accordingly.
{$a}
is in the wrong location and is exposed to the web!';
$string['check_unsecuredataroot_name'] = 'Insecure dataroot';
$string['check_unsecuredataroot_ok'] = 'Dataroot directory must not be accessible via the web.';
$string['check_unsecuredataroot_warning'] = 'Your dataroot directory {$a}
is in the wrong location and might be exposed to the web.';
$string['issue'] = 'Issue';
$string['pluginname'] = 'Security overview';
$string['security:view'] = 'View security report';
$string['status'] = 'Status';
$string['statuscritical'] = 'Critical';
$string['statusinfo'] = 'Information';
$string['statusok'] = 'OK';
$string['statusserious'] = 'Serious';
$string['statuswarning'] = 'Warning';
$string['timewarning'] = 'Data processing may take a long time, please be patient...';