On Nov 16, 2012, at 10:20 PM, Michele Newman wrote:
---
RHEL6/input/system/accounts/restrictions/account_expiration.xml | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/RHEL6/input/system/accounts/restrictions/account_expiration.xml b/RHEL6/input/system/accounts/restrictions/account_expiration.xml
index f0a1d5b..2e8c8f4 100644
--- a/RHEL6/input/system/accounts/restrictions/account_expiration.xml
+++ b/RHEL6/input/system/accounts/restrictions/account_expiration.xml
@@ -58,7 +58,7 @@ have been responsibly removed are not available to attackers
who may have compromised their credentials.
</rationale>
<oval id="accounts_disable_post_pw_expiration" value="var_account_disable_post_pw_expiration"/>
-<ref disa="15,16,17,795"/>
+<ref disa="16,17,795"/>
</Rule>
<Rule id="account_unique_name">
--
1.8.0