Item Search

NameAudit NamePluginCategory
ALMA-09-056230 - AlmaLinux OS 9 audit tools must be group-owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

APPL-11-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs).DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001012 - The macOS system must be configured with audit log files owned by root.DISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001013 - The macOS system must be configured with audit log folders owned by root.DISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001014 - The macOS system must be configured with audit log files group-owned by wheel.DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001015 - The macOS system must be configured with audit log folders group-owned by wheel.DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-11-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.DISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY

APPL-13-001012 - The macOS system must be configured with audit log files owned by root.DISA STIG Apple macOS 13 v1r5Unix

AUDIT AND ACCOUNTABILITY

APPL-13-001015 - The macOS system must be configured with audit log folders group-owned by wheel.DISA STIG Apple macOS 13 v1r5Unix

AUDIT AND ACCOUNTABILITY

Big Sur - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

AUDIT AND ACCOUNTABILITY

Big Sur - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

AUDIT AND ACCOUNTABILITY

Big Sur - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

AUDIT AND ACCOUNTABILITY

Big Sur - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

AUDIT AND ACCOUNTABILITY

Big Sur - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Big Sur v1.4.0 - All ProfilesUnix

AUDIT AND ACCOUNTABILITY

Catalina - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

AUDIT AND ACCOUNTABILITY

Catalina - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

AUDIT AND ACCOUNTABILITY

Catalina - Configure Audit Log Folders to Mode 700 or Less PermissiveNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

AUDIT AND ACCOUNTABILITY

FNFG-FW-000060 - The FortiGate firewall must protect the traffic log from unauthorized deletion of local log files and log records.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

MADB-10-002100 - The audit information produced by MariaDB must be protected from unauthorized modification.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MADB-10-002500 - MariaDB must protect its audit features from unauthorized removal.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

AUDIT AND ACCOUNTABILITY

Monterey - Configure Audit Log Files to Not Contain Access Control ListsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure Audit Log Files to Not Contain Access Control ListsNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure Audit Log Files to Not Contain Access Control ListsNIST macOS Monterey v1.0.0 - All ProfilesUnix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure Audit Log Files to Not Contain Access Control ListsNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-001400 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized deletion.DISA Oracle MySQL 8.0 v2r2 OS LinuxUnix

AUDIT AND ACCOUNTABILITY

MYS8-00-008100 - The MySQL Database Server 8.0 must protect its audit configuration from unauthorized modification.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

MYS8-00-008200 - The MySQL Database Server 8.0 must protect its audit features from unauthorized removal.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

AUDIT AND ACCOUNTABILITY

OL09-00-002571 - OL 9 audit tools must be owned by root.DISA Oracle Linux 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000015 - The Photon operating system audit log must have correct permissions.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000016 - The Photon operating system audit log must be owned by root.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000050 - The Photon operating system audit files and directories must have correct permissions - ausearchDISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000050 - The Photon operating system audit files and directories must have correct permissions - autraceDISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030110 - RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030121 - RHEL 8 audit system must protect auditing rules from unauthorized change.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030630 - RHEL 8 audit tools must be owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030640 - RHEL 8 audit tools must be group-owned by root.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-232103 - RHEL 9 "/etc/audit/" must be owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-232104 - RHEL 9 "/etc/audit/" must be group-owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-09-232225 - RHEL 9 audit tools must be group-owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

SHPT-00-000430 - SharePoint must protect audit information from unauthorized access to the usage and health logs.DISA STIG SharePoint 2010 v1r9Windows

AUDIT AND ACCOUNTABILITY

UBTU-20-010424 - The Ubuntu operating system must have directories that contain system commands owned by root.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-232040 - Ubuntu 22.04 LTS must have directories that contain system commands owned by "root".DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653060 - Ubuntu 22.04 LTS must be configured so that the audit log directory is not write-accessible by unauthorized users.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000760 - The WebSphere Application Server must protect log information from unauthorized deletion.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000770 - The WebSphere Application Server wsadmin file must be protected from unauthorized access.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000770 - The WebSphere Application Server wsadmin file must be protected from unauthorized access.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000780 - The WebSphere Application Server wsadmin file must be protected from unauthorized modification.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WG250 IIS6 - Users other than Auditors group must not have greater than read access to log files.DISA STIG IIS 6.0 Site Checklist v6r16Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

WG255 IIS6 - Access to the web site log files must be restricted.DISA STIG IIS 6.0 Site Checklist v6r16Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT