Item Search

NameAudit NamePluginCategory
AIOS-02-080008 - Apple iOS must implement the management setting: limit Ad Tracking.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-080014 - Apple iOS must not allow non-DoD applications to access DoD data.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-080016 - Apple iOS must implement the management setting: not allow automatic completion of Safari browser passcodes.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-080103 - Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-090101 - Apple iOS must implement the management setting: Disable Allow iCloud Photo Library.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-10-080102 - Apple iOS must implement the management setting: remove managed applications upon unenrollment from MDM.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-10-080102 - Apple iOS must implement the management setting: remove managed applications upon unenrollment from MDM.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-14-011900 - Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DoD security requirements.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

CONFIGURATION MANAGEMENT

APPL-12-002066 - The macOS system must not allow an unattended or automatic logon to the system.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-12-003051 - The macOS system must be configured so that the su command requires smart card authentication.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

ARST-L2-000150 - The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-L2-000160 - The Arista MLS layer 2 switch must have all trunk links enabled statically.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-ND-000860 - The Arista network device must be running an operating system release that is currently supported by the vendor.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

CONFIGURATION MANAGEMENT

ARST-RT-000710 - The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

ARST-RT-000800 - The Arista perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

CASA-FW-000100 - The Cisco ASA must be configured to use TCP when sending log records to the central audit server - Logging Permit-hostdownDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

CASA-FW-000270 - The Cisco ASA must be configured to inspect all inbound and outbound traffic at the application layer.DISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

KNOX-07-000200 - The Samsung must be configured to not allow passwords with more than two repeating or sequential characters - NumbersMobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012900 - The Samsung Android 7 with Knox must implement the management setting: Disable Admin Remove.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-013100 - The Samsung Android 7 with Knox must implement the management setting: Disable Manual Date Time Changes.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-013900 - The Samsung Android 7 with Knox must implement the management setting: Disable Move Files from Container to Personal.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-017200 - The Samsung Android 7 with Knox must be configured to disable Phone Visibility.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-018400 - The Samsung Android 7 with Knox must implement the management setting: Configure application disable list.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-018600 - The Samsung Android 7 with Knox must implement the management setting: Configure minimum password complexity.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-018800 - The Samsung Android 7 with Knox must implement the management setting: Enable Audit Log.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-018900 - The Samsung Android 7 with Knox must use a NIAP certified container for work data and applications.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-019000 - Samsung Android 7 mobile device users must complete required training.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-019100 - The Samsung Android 7 with Knox platform must implement the management setting Disable Nearby devices.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-900300 - The Samsung must be configured to not allow Container passwords with more than two repeating or sequential characters.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913200 - The Samsung must implement the management setting: Configure to enforce a minimum Container password length of 4 charactersAirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913400 - The Samsung must implement the setting: Configure to prohibit more than 10 failed Container authentication attempts.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914400 - The Samsung Android 7 with Knox must implement the management setting: Container Account blacklist.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914500 - The Samsung Android 7 with Knox must implement the management setting: Configure minimum Container password complexity.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

PHTN-67-000118 - The Photon operating system must protect all boot configuration files from unauthorized access.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

CONFIGURATION MANAGEMENT

PHTN-67-000119 - The Photon operating system must protect sshd configuration from unauthorized access.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

CONFIGURATION MANAGEMENT

PHTN-67-000999 - The version of the Photon OS running on the server must be a supported version.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040331 - The sshd server must bind the X11 forwarding server to the loopback address.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

UBTU-16-030401 - The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

VCTR-67-000014 - The vCenter Server must set the distributed port group MAC Address Change policy to reject.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000019 - The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000020 - The vCenter Server must not configure all port groups to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000025 - The vCenter Server must disable the managed object browser (MOB) at all times when not required for troubleshooting or maintenance of managed objects.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000052 - The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000055 - The vCenter Server must configure the vSAN Datastore name to a unique name.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000059 - The vCenter Server must enable certificate based authentication.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000072 - The vCenter Server services must be ran using a service account instead of a built-in Windows account.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000075 - The vCenter Server must enable all tasks to be shown to Administrators in the Web Client.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VMCH-67-000007 - HGFS file transfers must be disabled on the virtual machine.DISA STIG VMware vSphere 6.7 Virtual Machine v1r3VMware

CONFIGURATION MANAGEMENT

VMCH-67-000012 - Unauthorized USB devices must be disconnected on the virtual machine.DISA STIG VMware vSphere 6.7 Virtual Machine v1r3VMware

CONFIGURATION MANAGEMENT

VMCH-67-000999 - The version of VMM running on the server must be a supported version.DISA STIG VMware vSphere 6.7 Virtual Machine v1r3VMware

CONFIGURATION MANAGEMENT