Item Search

NameAudit NamePluginCategory
1.12 Set 'Disable the Office client from polling the SharePoint Server for published links' to 'Enabled'CIS MS Office Outlook 2010 v1.0.0Windows

CONFIGURATION MANAGEMENT

2.2.27 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.3.6.2 (L1) Ensure 'Disable UI extending from documents and templates' is set to 'Enabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.18.5 Ensure 'Prevent users from changing permissions on rights managed content' is set to 'Disabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

ACCESS CONTROL, MEDIA PROTECTION

2.3.22.2 Ensure 'Block signing into Office' is set to 'Enabled: Org ID only'CIS Microsoft Office Enterprise v1.2.0 L1Windows

ACCESS CONTROL

2.3.27.11 (L1) Ensure 'Disable password to open UI' is set to 'Disabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.27.18 Ensure 'Protect document metadata for rights managed Office Open XML Files' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.28.2 Ensure 'Disable the Office client from polling the SharePoint Server for published links' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT

2.26.2 Ensure 'Disable The Office Client From Polling The SharePoint Server For Published Links' is set to EnabledCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.34.2.1 Ensure 'Online Content Options' is set to Enabled (Allow Office to connect to the internet)CIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

20.30 Ensure 'FTP servers must be configured to prevent anonymous logons'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.30 Ensure 'FTP servers must be configured to prevent anonymous logons'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

ALMA-09-018830 - AlmaLinux OS 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Automatically activate Office with federated organization credentialsMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Automatically activate Office with federated organization credentialsMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Automatically activate Office with federated organization credentialsMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Automatically activate Office with federated organization credentialsMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Automatically activate Office with federated organization credentialsMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

DTOO199 - Changing permissions on rights managed content for users must be enforced.DISA STIG Microsoft Office System 2013 v2r2Windows

ACCESS CONTROL

DTOO199 - Office System - Changing permissions on rights managed content for users must be enforced.DISA STIG Office System 2010 v1r13Windows

ACCESS CONTROL

DTOO426 - Word must be configured to warn when opening a document with custom XML markup.DISA STIG Microsoft Word 2013 v1r7Windows

CONFIGURATION MANAGEMENT

EX13-CA-000020 - Exchange must have authenticated access set to Integrated Windows Authentication only.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX13-CA-000045 - Exchange Email Diagnostic log level must be set to lowest level.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

AUDIT AND ACCOUNTABILITY

EX13-CA-000075 - Exchange must have Audit data protected against unauthorized modification.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

AUDIT AND ACCOUNTABILITY

EX13-CA-000085 - Exchange must have Audit data on separate partitions.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

AUDIT AND ACCOUNTABILITY

EX13-CA-000095 - Exchange IMAP4 service must be disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

CONFIGURATION MANAGEMENT

EX13-CA-000105 - Exchange must have the Public Folder virtual directory removed if not in use by the site.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

CONFIGURATION MANAGEMENT

EX13-CA-000115 - Exchange application directory must be protected from unauthorized access.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

CONFIGURATION MANAGEMENT

EX13-CA-000130 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

CONFIGURATION MANAGEMENT

EX13-CA-000145 - Exchange must provide redundancy.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-CA-000165 - Exchange must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

CONFIGURATION MANAGEMENT

F5BI-AP-000023 - The F5 BIG-IP appliance providing user access control intermediary services must display the Standard Mandatory DOD-approved Notice and Consent Banner before granting access to resources.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

ACCESS CONTROL

F5BI-AP-000075 - The BIG-IP APM module must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000077 - The BIG-IP APM module must restrict user authentication traffic to specific authentication server(s) when providing user authentication to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000085 - The BIG-IP APM module must map the authenticated identity to the user account for PKI-based authentication to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000151 - The BIG-IP APM module access policy profile must be configured to display an explicit logoff message to users, indicating the reliable termination of authenticated communications sessions when disconnecting from virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

F5BI-AP-000239 - The F5 BIG-IP appliance must be configured to set the 'Max In Progress Sessions per Client IP' value to 10 or less - Max In Progress Sessions per Client IP value to 10 or less.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

ACCESS CONTROL

F5BI-AP-000243 - The F5 BIG-IP appliance must be configured to disable the 'Persistent' cookie flag - Persistent cookie flag.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-999999 - The version of F5 BIG-IP must be a supported version.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND INFORMATION INTEGRITY

VCFL-67-000027 - Rsyslog must be configured to monitor and ship vSphere Client log files - runtimeDISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

AUDIT AND ACCOUNTABILITY

VCLD-67-000014 - Rsyslog must be configured to monitor VAMI logs.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

AUDIT AND ACCOUNTABILITY

VCUI-67-000027 - vSphere UI log files must be moved to a permanent repository in accordance with site policy - accessDISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v3r1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WPAW-00-000700 - The Windows PAW must be configured with a vendor-supported version of Windows 11 and applicable security patches that are DOD approved.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT

WPAW-00-001060 - Device Guard Code Integrity Policy must be used on the Windows PAW to restrict applications that can run on the system (Device Guard User Mode Code Integrity).DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT

WPAW-00-001600 - The Windows PAW must be configured to enforce two-factor authentication and use Active Directory for authentication management.DISA MS Windows Privileged Access Workstation v3r1Windows

IDENTIFICATION AND AUTHENTICATION

WPAW-00-001800 - If several Windows PAWs are set up in virtual machines (VMs) on a host server, the host server must only contain PAW VMs.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT

WPAW-00-002400 - Local privileged groups (excluding Administrators) on the Windows PAW must be restricted to include no members - excluding Administrators on the Windows PAW must be restricted to include no membersDISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT

WPAW-00-002500 - Restricted remote administration must be enabled for high-value systems.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT