2.023 - Standard user accounts must only have Read permissions to the Winlogon registry key. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
3.030 - Anonymous access to the registry must be restricted. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.005 - Unapproved Users have access to Debug programs. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.009 - Unauthorized users are granted right to Act as part of the operating system. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.027 - Only administrators responsible for the system must have Administrator rights on the system. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
APPL-14-002069 The macOS system must require administrator privileges to modify systemwide settings. | DISA Apple macOS 14 (Sonoma) STIG v2r3 | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Big Sur - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL |
Catalina - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - group | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - group | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - user | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | ACCESS CONTROL |
DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - user | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | ACCESS CONTROL |
DTOO201 - Office System - Connection verification of permissions must be enforced. | DISA STIG Office System 2010 v1r13 | Windows | ACCESS CONTROL |
GOOG-12-012200 - Google Android 12 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)]. | AirWatch - DISA Google Android 12 COBO v1r2 | MDM | ACCESS CONTROL |
GOOG-14-012200 - Google Android 14 must be configured to disable all data signaling over [assignment: list of externally accessible hardware ports (for example, USB)] - for example, USB]. | AirWatch - DISA Google Android 14 COBO v2r1 | MDM | ACCESS CONTROL |
JUEX-NM-000930 - The Juniper EX switch must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | DISA Juniper EX Series Network Device Management v2r2 | Juniper | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL |
Monterey - Configure the System to Block Non-Privileged Users from Executing Privileged Functions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
MSFT-11-005200 - The mobile operating system must allow only the Administrator (MDM) to perform the following management function: Enable/disable location services. | AirWatch - DISA Microsoft Android 11 COPE v1r2 | MDM | ACCESS CONTROL |
MYS8-00-010700 - The MySQL Database Server 8.0 must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | ACCESS CONTROL |
PHTN-40-000105 The Photon operating system must enable symlink access control protection in the kernel. | DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1 | Unix | ACCESS CONTROL |
RHEL-09-211045 - The systemd Ctrl-Alt-Delete burst key sequence in RHEL 9 must be disabled. | DISA Red Hat Enterprise Linux 9 STIG v2r3 | Unix | ACCESS CONTROL |
WINRG-000001 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
WN11-SO-000167 - Remote calls to the Security Account Manager (SAM) must be restricted to Administrators. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN11-UR-000110 - The 'Impersonate a client after authentication' user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN11-UR-000150 - The 'Profile single process' user right must only be assigned to the Administrators group. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN22-DC-000110 - Windows Server 2022 organization created Active Directory Organizational Unit (OU) objects must have proper access control permissions. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-DC-000420 - Windows Server 2022 Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-MS-000010 - Windows Server 2022 must only allow administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-UR-000010 - Windows Server 2022 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-UR-000040 - Windows Server 2022 back up files and directories user right must only be assigned to the Administrators group. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-UR-000050 - Windows Server 2022 create a pagefile user right must only be assigned to the Administrators group. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |
WN22-UR-000100 - Windows Server 2022 debug programs user right must only be assigned to the Administrators group. | DISA Microsoft Windows Server 2022 STIG v2r3 | Windows | ACCESS CONTROL |