ADBP-XI-000285 - Adobe Acrobat Pro XI access to websites must be blocked. | DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2 | Windows | CONFIGURATION MANAGEMENT |
ADBP-XI-001295 - Adobe Acrobat Pro XI Adobe Repair Installation must be disabled. | DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2 | Windows | CONFIGURATION MANAGEMENT |
APPL-13-005058 - The macOS system must be configured to prevent activity continuation between Apple devices. | DISA STIG Apple macOS 13 v1r5 | Unix | CONFIGURATION MANAGEMENT |
APPL-15-001029 - The macOS system must configure audit retention to seven days. | DISA Apple macOS 15 (Sequoia) STIG v1r3 | Unix | AUDIT AND ACCOUNTABILITY |
EDGE-00-000034 - Edge development tools must be disabled. | DISA STIG Edge v2r2 | Windows | CONFIGURATION MANAGEMENT |
ESXI-70-000027 - The ESXi host Secure Shell (SSH) daemon must set a timeout interval on idle sessions. | DISA STIG VMware vSphere 7.0 ESXi OS v1r4 | Unix | CONFIGURATION MANAGEMENT |
ESXI-80-000213 - The ESXi host must disable Inter-Virtual Machine (VM) Transparent Page Sharing. | DISA VMware vSphere 8.0 ESXi STIG v2r3 | VMware | CONFIGURATION MANAGEMENT |
GOOG-11-000500 - Google Android 11 must be configured to not allow more than ten consecutive failed authentication attempts. | AirWatch - DISA Google Android 11 COPE v2r1 | MDM | ACCESS CONTROL |
GOOG-11-003400 - Google Android 11 must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device. | AirWatch - DISA Google Android 11 COBO v2r1 | MDM | ACCESS CONTROL |
GOOG-11-006100 - Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations. | AirWatch - DISA Google Android 11 COBO v2r1 | MDM | AUDIT AND ACCOUNTABILITY |
GOOG-11-006100 - Google Android 11 must be configured to generate audit records for the following auditable events: detected integrity violations. | MobileIron - DISA Google Android 11 COBO v2r1 | MDM | AUDIT AND ACCOUNTABILITY |
GOOG-11-011100 - Google Android 11 devices must be configured to enable Common Criteria Mode (CC Mode). | MobileIron - DISA Google Android 11 COPE v2r1 | MDM | CONFIGURATION MANAGEMENT |
GOOG-12-007700 - Google Android 12 must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device. | AirWatch - DISA Google Android 12 COPE v1r2 | MDM | ACCESS CONTROL |
GOOG-12-011000 - Android 12 devices must be configured to enable Common Criteria Mode (CC Mode). | AirWatch - DISA Google Android 12 COBO v1r2 | MDM | CONFIGURATION MANAGEMENT |
GOOG-13-707700 - Google Android 13 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the Work Profile. | MobileIron - DISA Google Android 13 BYOD v1r2 | MDM | ACCESS CONTROL |
GOOG-15-007700 - Google Android 15 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device. | MobileIron - DISA Google Android 15 COBO v1r2 | MDM | ACCESS CONTROL |
GOOG-15-007700 - Google Android 15 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the device. | AirWatch - DISA Google Android 15 COPE v1r2 | MDM | ACCESS CONTROL |
GOOG-15-011000 - Android 15 devices must be configured to enable Common Criteria (CC) Mode - CC Mode. | AirWatch - DISA Google Android 15 COPE v1r2 | MDM | CONFIGURATION MANAGEMENT |
HONW-09-000500 - The Honeywell Mobility Edge Android Pie device must be configured to not allow more than 10 consecutive failed authentication attempts. | MobileIron - DISA Honeywell Android 9.x COPE v1r2 | MDM | ACCESS CONTROL |
HONW-09-006100 - The Honeywell Mobility Edge Android Pie device must be configured to generate audit records for the following auditable events: detected integrity violations. | MobileIron - DISA Honeywell Android 9.x COBO v1r2 | MDM | AUDIT AND ACCOUNTABILITY |
MOTO-09-000500 - The Motorola Android Pie must be configured to not allow more than 10 consecutive failed authentication attempts. | AirWatch - DISA Motorola Android Pie.x COPE v1r2 | MDM | ACCESS CONTROL |
MOTO-09-003400 - The Motorola Android Pie must be configured to display the DoD advisory warning message at startup or each time the user unlocks the device. | AirWatch - DISA Motorola Android Pie.x COBO v1r2 | MDM | ACCESS CONTROL |
MOTS-11-006100 - Motorola Solutions Android 11 must be configured to generate audit records for the following auditable events: Detected integrity violations. | AirWatch - DISA Motorola Solutions Android 11 COBO v1r3 | MDM | AUDIT AND ACCOUNTABILITY |
MSFT-11-003400 - Microsoft Android 11 must be configured to display the DOD advisory warning message at start-up or each time the user unlocks the device. | MobileIron - DISA Microsoft Android 11 COBO v1r2 | MDM | ACCESS CONTROL |
OL08-00-010171 - OL 8 must have the "policycoreutils" package installed. | DISA Oracle Linux 8 STIG v2r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
OL08-00-010472 - OL 8 must have the packages required to use the hardware random number generator entropy gatherer service. | DISA Oracle Linux 8 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-030741 - OL 8 must disable the chrony daemon from acting as a server. | DISA Oracle Linux 8 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-040024 - OL 8 must disable the transparent inter-process communication (TIPC) protocol. | DISA Oracle Linux 8 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-040025 - OL 8 must disable mounting of cramfs. | DISA Oracle Linux 8 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-040310 - The OL 8 file integrity tool must be configured to verify Access Control Lists (ACLs). | DISA Oracle Linux 8 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231195 - RHEL 9 must disable mounting of cramfs. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-291025 - RHEL 9 must enable Linux audit logging for the USBGuard daemon. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
SLES-12-010375 - The SUSE operating system must restrict access to the kernel message buffer. | DISA SLES 12 STIG v3r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SQL2-00-022300 - SQL Server must limit the use of resources by priority and not impede the host from servicing processes designated as a higher priority. | DISA STIG SQL Server 2012 DB Instance Security v1r20 | MS_SQLDB | SYSTEM AND COMMUNICATIONS PROTECTION |
SQL2-00-039100 - The SQL Server Browser service must be disabled if its use is not necessary. | DISA STIG SQL Server 2012 Database OS Audit v1r20 | Windows | CONFIGURATION MANAGEMENT |
UBTU-20-010215 - The Ubuntu operating system must allocate audit record storage capacity to store at least one weeks' worth of audit records, when audit records are not immediately sent to a central audit record storage facility. | DISA Canonical Ubuntu 20.04 LTS STIG v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
UBTU-22-215020 - Ubuntu 22.04 LTS must not have the "systemd-timesyncd" package installed. | DISA Canonical Ubuntu 22.04 LTS STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-22-412020 - Ubuntu 22.04 LTS must limit the number of concurrent sessions to ten for all accounts and/or account types. | DISA Canonical Ubuntu 22.04 LTS STIG v2r4 | Unix | ACCESS CONTROL |
UBTU-22-653025 - Ubuntu 22.04 LTS must alert the information system security officer (ISSO) and system administrator (SA) in the event of an audit processing failure. | DISA Canonical Ubuntu 22.04 LTS STIG v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
UBTU-24-100010 - Ubuntu 24.04 LTS must not have the "systemd-timesyncd" package installed. | DISA Canonical Ubuntu 24.04 LTS STIG v1r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-24-300024 - Ubuntu 24.04 LTS must display the date and time of the last successful account logon upon logon. | DISA Canonical Ubuntu 24.04 LTS STIG v1r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-24-900980 - Ubuntu 24.04 LTS must alert the system administrator (SA) and information system security officer (ISSO) (at a minimum) in the event of an audit processing failure. | DISA Canonical Ubuntu 24.04 LTS STIG v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
WBSP-AS-000640 - The WebSphere Application Server must alert the SA and ISSO, in the event of a log processing failure - enabled | DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware | Unix | AUDIT AND ACCOUNTABILITY |
WBSP-AS-000660 - The WebSphere Application Server must shut down by default upon log failure (unless availability is an overriding concern). | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
WBSP-AS-000670 - The WebSphere Application Server high availability applications must be configured to fail over in log subsystem failure. | DISA IBM WebSphere Traditional 9 Windows STIG v1r1 | Windows | AUDIT AND ACCOUNTABILITY |
WBSP-AS-000670 - The WebSphere Application Server high availability applications must be configured to fail over in log subsystem failure. | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
WBSP-AS-000740 - The WebSphere Application Server must be configured to protect log information from any type of unauthorized read access. | DISA IBM WebSphere Traditional 9 STIG v1r1 | Unix | AUDIT AND ACCOUNTABILITY |
WBSP-AS-000930 - The WebSphere Application Server sample applications must be removed. | DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware | Unix | CONFIGURATION MANAGEMENT |
WN22-CC-000040 - Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | CONFIGURATION MANAGEMENT |
WN22-CC-000050 - Windows Server 2022 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | CONFIGURATION MANAGEMENT |