Item Search

NameAudit NamePluginCategory
2.2.1.3 Ensure 'Allow managed apps to store data in iCloud' is set to 'Disabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.3 Ensure 'Allow managed apps to store data in iCloud' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.3 Ensure 'Allow managed apps to store data in iCloud' is set to 'Disabled'MobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.3 Ensure 'Allow managed apps to store data in iCloud' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.3 Ensure 'Allow managed apps to store data in iCloud' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'MobileIron - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'MobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

CONTINGENCY PLANNING

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

CONTINGENCY PLANNING

3.2.1.8 Ensure 'Force encrypted backups' is set to 'Enabled'MobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.10 Ensure 'Force encrypted backups' is set to 'Enabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

CONTINGENCY PLANNING

3.2.1.11 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.11 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.11 Ensure 'Allow installing configuration profiles' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.2.1.12 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.12 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.13 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'AirWatch - CIS Apple iOS 10 v2.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.13 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'MobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.14 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.14 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.14 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.15 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'MobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.17 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

3.2.1.17 Ensure 'Allow pairing with non-Configurator hosts' is set to 'Disabled'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

5.1 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

5.1 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

5.1 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

5.1 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

5.1 Ensure 'Microsoft FTP Service (FTPSVC)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.10 Ensure 'Active Directory SYSVOL directory must have the proper access control permissions' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.10 Ensure 'Active Directory SYSVOL directory must have the proper access control permissions' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.20 Ensure 'DoD Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systemsCIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.23 Ensure 'Domain controllers have a PKI server certificate' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.51 Ensure 'Permissions for the system drive root directory must conform to minimum requirements' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

20.64 Ensure 'TFTP Client' is 'not installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.64 Ensure 'TFTP Client' is 'not installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.64 Ensure 'TFTP Client' is 'not installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.64 Ensure 'TFTP Client' is 'not installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.69 Ensure 'US DoD CCEB Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systemsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.69 Ensure 'US DoD CCEB Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systemsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.69 Ensure 'US DoD CCEB Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systems (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-13-012200 - Apple iOS/iPadOS users must complete required training.AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-14-010300 - Apple iOS/iPadOS users must complete required training.MobileIron - DISA Apple iOS/iPadOS 14 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-15-014400 - Apple iOS/iPadOS 15 must disable connections to Siri servers for the purpose of dictation.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-014400 - Apple iOS/iPadOS 16 must disable connections to Siri servers for the purpose of dictation.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-IP-000027 - The Juniper Networks SRX Series Gateway IDPS must perform real-time monitoring of files from external sources at network entry/exit points.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

PANW-NM-000110 - The Palo Alto Networks security platform must accept and verify Personal Identity Verification (PIV) credentials - PIV credentialsDISA STIG Palo Alto NDM v3r3Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION