Item Search

NameAudit NamePluginCategory
1.1.18.9 (L2) Ensure 'network.IDN_show_punycode' is set to 'Enabled'CIS Mozilla Firefox ESR GPO v1.0.0 L2Windows

SYSTEM AND INFORMATION INTEGRITY

1.7.8 Ensure GDM autorun-never is enabledCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

MEDIA PROTECTION

1.7.8 Ensure GDM autorun-never is enabledCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

MEDIA PROTECTION

4.1.2.1 Ensure local user Home directories existsCIS IBM AIX 7 v1.0.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.6 (L2) Ensure Strict Lockdown mode is enabledCIS VMware ESXi 7.0 v1.5.0 L2VMware

ACCESS CONTROL

5.7 Ensure HTTP Request Methods Are RestrictedCIS Apache HTTP Server 2.4 v2.2.0 L1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.3 (L1) Ensure email from external senders is identifiedCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

CONFIGURATION MANAGEMENT

8.4.13 (L2) Ensure Trash Folder State is disabledCIS VMware ESXi 7.0 v1.5.0 L2VMware

CONFIGURATION MANAGEMENT

AIX7-00-002015 - Audit logs on the AIX system must be set to 660 or less permissive.DISA STIG AIX 7.x v3r1Unix

AUDIT AND ACCOUNTABILITY

AOSX-15-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another users files - Access Control ListDISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - Access Control ListDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory groupsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory permissionsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Access Control ListsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory permissionsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Public Access Control ListsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Public permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Public permissionsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

IDENTIFICATION AND AUTHENTICATION

JUEX-L2-000040 - The Juniper EX switch must be configured to manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000005 - The Photon operating system must set a session inactivity timeout of 15 minutes or less - durationDISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL, MAINTENANCE

PHTN-67-000005 - The Photon operating system must set a session inactivity timeout of 15 minutes or less - exportDISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL, MAINTENANCE

RHEL-07-030680 - The Red Hat Enterprise Linux operating system must audit all uses of the su command.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-07-030710 - The Red Hat Enterprise Linux operating system must audit all uses of the newgrp command.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-08-030315 - Successful/unsuccessful uses of userhelper in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-654035 - RHEL 9 must audit all uses of the chacl command.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-09-654175 - RHEL 9 must audit all uses of the usermod command.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLES-12-020370 - The SUSE operating system must generate audit records for all uses of the setxattr, fsetxattr, lsetxattr, removexattr, fremovexattr, and lremovexattr syscalls.DISA SLES 12 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SRG-OS-000231-ESXI5 - The operating system must enforce requirements for remote connections to the information system.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

ACCESS CONTROL

SRG-OS-000250-ESXI5 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms - MACs with FIPS 140-2 approved cryptoDISA STIG VMWare ESXi Server 5 STIG v2r1VMware

ACCESS CONTROL

WN16-AU-000100 - Windows Server 2016 must be configured to audit Account Management - Other Account Management Events successes.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-AU-000360 - Windows Server 2016 must be configured to audit Privilege Use - Sensitive Privilege Use failures.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-AU-000400 - Windows Server 2016 must be configured to audit System - Other System Events failures.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-AU-000420 - Windows Server 2016 must be configured to audit System - Security System Extension successes.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-CC-000510 - The Windows Remote Management (WinRM) client must not allow unencrypted traffic.DISA Microsoft Windows Server 2016 STIG v2r10Windows

MAINTENANCE

WN19-AU-000090 - Windows Server 2019 must be configured to audit Account Management - Other Account Management Events successes.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000280 - Windows Server 2019 must be configured to audit Policy Change - Authentication Policy Change successes.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000300 - Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use successes.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000310 - Windows Server 2019 must be configured to audit Privilege Use - Sensitive Privilege Use failures.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000370 - Windows Server 2019 must be configured to audit System - Security System Extension successes.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-00-000280 - Windows Server 2022 must have a host-based firewall installed and enabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT

WN22-AU-000090 - Windows Server 2022 must be configured to audit Account Management - Other Account Management Events successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000210 - Windows Server 2022 must be configured to audit Logon/Logoff - Special Logon successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

AUDIT AND ACCOUNTABILITY

WN22-AU-000280 - Windows Server 2022 must be configured to audit Policy Change - Authentication Policy Change successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000300 - Windows Server 2022 must be configured to audit Privilege Use - Sensitive Privilege Use successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000370 - Windows Server 2022 must be configured to audit System - Security System Extension successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-DC-000300 - Windows Server 2022 PKI certificates associated with user accounts must be issued by a DoD PKI or an approved External Certificate Authority (ECA).DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION