Item Search

NameAudit NamePluginCategory
1.2.2 Configure IP Blocking on Failed LoginsCIS Cisco NX-OS v1.2.0 L1Cisco

AUDIT AND ACCOUNTABILITY

1.8 Ensure 'Attachment Filtering Agent' is configuredCIS Microsoft Exchange Server 2019 L1 Edge v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

2.2.29 (L2) Configure 'Log on as a service'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

ACCESS CONTROL

8.5.1 (L2) Ensure VM limits are configured correctlyCIS VMware ESXi 7.0 v1.5.0 L2VMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

9.1.10 Ensure that Microsoft Defender for Cloud is configured to check VM operating systems for updatesCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

ALMA-09-035110 - AlmaLinux OS 9 must prevent a user from overriding the disabling of the graphical user interface autorun function.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

ALMA-09-050620 - AlmaLinux OS 9 must generate audit records for any use of the "ssh-keysign" command.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

AOSX-13-000070 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

AOSX-15-001001 - The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

APPL-11-000011 - The macOS system must disable the SSHD service.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-11-000055 - The macOS system must use only Message Authentication Codes (MACs) employing FIPS 140-2 validated cryptographic hash algorithms.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-11-000056 - The macOS system must implement an approved Key Exchange Algorithm.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

APPL-12-001001 - The macOS system must generate audit records for all account creations, modifications, disabling, and termination events; privileged activities or other system-level access; all kernel module load, unload, and restart actions; all program initiations; and organizationally defined events for all non-local maintenance and diagnostic sessions.DISA STIG Apple macOS 12 v1r9Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

DISA_CloudLinux_AlmaLinux_OS_9_STIG_v1r2.audit from DISA CloudLinux AlmaLinux OS 9 STIG v1r2DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix
OL07-00-010344 - The Oracle Linux operating system must not be configured to bypass password requirements for privilege escalation.DISA Oracle Linux 7 STIG v3r2Unix

IDENTIFICATION AND AUTHENTICATION

OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation.DISA Oracle Linux 7 STIG v3r2Unix

IDENTIFICATION AND AUTHENTICATION

OL07-00-910055 - The Oracle Linux operating system must protect audit information from unauthorized read, modification, or deletion.DISA Oracle Linux 7 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

OL08-00-030300 - OL 8 must generate audit records for any use of the "mount" command.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

OL08-00-030302 - OL 8 must generate audit records for any use of the "mount" syscall.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

OL08-00-030350 - OL 8 must generate audit records for any use of the "newgrp" command.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

OL08-00-030390 - OL 8 must generate audit records for any use of the delete_module syscall.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

OL08-00-030410 - OL 8 must generate audit records for any use of the "chsh" command.DISA Oracle Linux 8 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-07-030000 - The Red Hat Enterprise Linux operating system must be configured so that auditing is configured to produce records containing information to establish what type of events occurred, where the events occurred, the source of the events, and the outcome of the events. These audit records must also identify individual identities of group account users.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030090 - RHEL 8 audit logs must be group-owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030120 - RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-252025 - RHEL 9 must disable the chrony daemon from acting as a server.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-252030 - RHEL 9 must disable network management of the chrony daemon.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-432025 - RHEL 9 must require users to reauthenticate for privilege escalation.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-654250 - RHEL 9 must generate audit records for all account creations, modifications, disabling, and termination events that affect /var/log/faillock.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLES-15-010240 - The SUSE operating system must disable the file system automounter unless required.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-010450 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-030250 - The SUSE operating system must generate audit records for all uses of the chown, fchown, fchownat, and lchown system calls.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SOL-11.1-010440 - The operating system must protect audit information from unauthorized access.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SRG-OS-000080-ESXI5 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

ACCESS CONTROL

SRG-OS-000095-ESXI5 - Inetd and xinetd must be disabled or removed if no network services utilizing them are enabled.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

SRG-OS-000104-ESXI5 - All accounts must be assigned unique User Identification Numbers (UIDs) - UIDsDISA STIG VMWare ESXi Server 5 STIG v2r1VMware

IDENTIFICATION AND AUTHENTICATION

SRG-OS-000120-ESXI5 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

IDENTIFICATION AND AUTHENTICATION

SRG-OS-000126-ESXI5 - The system must set a timeout for the ESXi Shell to automatically disable itself after a predetermined period.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

MAINTENANCE

SRG-OS-000163-ESXI5 - The operating system must terminate the network connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-020110 - Audit logs must be owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-16-020140 - Audit log directory must be group-owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010439 - The Ubuntu operating system must be configured to use AppArmor.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WN16-AU-000250 - Windows Server 2016 must be configured to audit Logon/Logoff - Logoff successes.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-AU-000270 - Windows Server 2016 must be configured to audit Logon/Logoff - Logon failures.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000190 - Windows Server 2019 must be configured to audit logon successes.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000200 - Windows Server 2019 must be configured to audit logon failures.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000200 - Windows Server 2022 must be configured to audit logon failures.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY