Item Search

NameAudit NamePluginCategory
2.6 Ensure Allowlist violations are enabledCIS IBM AIX 7 v1.1.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

2.7 Ensure regular scans for unauthorized applicationsCIS IBM AIX 7 v1.1.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.22 (L1) Host must deny shell access for the dcui accountCIS VMware ESXi 8.0 v1.2.0 L1VMware

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

AOSX-14-002031 - The macOS system must be configured to disable the system preference pane for iCloud.DISA STIG Apple Mac OSX 10.14 v2r6Unix

CONFIGURATION MANAGEMENT

Big Sur - Disable the System Preference Pane for Apple IDNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the System Preference Pane for Apple IDNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the System Preference Pane for Apple IDNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the System Preference Pane for Apple IDNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the System Preference Pane for Apple IDNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable the System Preference Pane for Apple IDNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable the System Preference Pane for Apple IDNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable the System Preference Pane for Apple IDNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable the System Preference Pane for Apple IDNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable the System Preference Pane for Apple IDNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ESXI-80-000133 - The ESXi Image Profile and vSphere Installation Bundle (VIB) acceptance level must be verified.DISA VMware vSphere 8.0 ESXi STIG v2r3Unix

CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable FaceTime.appNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Messages AppNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Siri Setup during Setup AssistantNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Siri Setup during Setup AssistantNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Siri Setup during Setup AssistantNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Siri Setup during Setup AssistantNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Siri Setup during Setup AssistantNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Siri Setup during Setup AssistantNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

OL08-00-040135 - The OL 8 "fapolicy" module must be installed.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040137 - The OL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL09-00-000341 - OL 9 must enable the fapolicy module.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000018 - A file integrity baseline must be created.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000302 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000304 - The operating system must employ automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization defined frequency.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000305 - The operating system must provide a near real-time alert when any of the organization defined list of compromise or potential compromise indicators occurs.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000306 - The operating system must detect unauthorized changes to software and information.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-433010 - RHEL 9 fapolicy module must be installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-433015 - RHEL 9 fapolicy module must be enabled.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

WN10-00-000035 - The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN12-00-000018 - The operating system must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN16-00-000090 - Windows Server 2016 must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT