| 2.1.1 Disable Bluetooth, if no paired devices exist | CIS Apple OSX 10.10 Yosemite L1 v1.2.0 | Unix | |
| 2.1.1 Disable Bluetooth, if no paired devices exist - Bluetooth is paired | CIS Apple OSX 10.11 El Capitan L1 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
| 12.50 Intrusion detection system on host - 'Utilize' | CIS v1.1.0 Oracle 11g OS L2 | Unix | |
| 12.50 Intrusion detection system on host - 'Utilize' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | |
| AIX7-00-002145 - The AIX /etc/syslog.conf file must be group-owned by system. | DISA STIG AIX 7.x v3r1 | Unix | CONFIGURATION MANAGEMENT |
| ALMA-09-045340 - AlmaLinux OS 9 must have the Advanced Intrusion Detection Environment (AIDE) package installed. | DISA Cloud Linux AlmaLinux OS 9 STIG v1r5 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
| APPL-15-003080 - The macOS system must disable accounts after 35 days of inactivity. | DISA Apple macOS 15 Sequoia STIG v1r7 | Unix | ACCESS CONTROL |
| AZLX-23-001060 - Amazon Linux 2023 must have the Advanced Intrusion Detection Environment (AIDE) package installed. | DISA Amazon Linux 2023 STIG v1r2 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
| BIND-9X-001890 - The BIND 9.x server implementation must maintain at least three file versions of the local log file. | DISA BIND 9.x STIG v3r1 | Unix | AUDIT AND ACCOUNTABILITY |
| BIND-9X-001900 - The BIND 9.x server implementation must be configured with a channel to send audit records to a local file. | DISA BIND 9.x STIG v3r1 | Unix | AUDIT AND ACCOUNTABILITY |
| Brocade - Bottleneck alerts must be enabled | Tenable Best Practices Brocade FabricOS | Brocade | AUDIT AND ACCOUNTABILITY |
| CIS_Azure_Compute_Microsoft_Windows_Server_2019_v1.0.0_L1_DC.audit from CIS Azure Compute Microsoft Windows Server 2019 Benchmark v1.0.0 | CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DC | Windows | |
| CIS_Azure_Compute_Microsoft_Windows_Server_2022_v1.0.0_L1_MS.audit from CIS Azure Compute Microsoft Windows Server 2022 Benchmark v1.0.0 | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MS | Windows | |
| CIS_Azure_Compute_Microsoft_Windows_Server_2022_v1.0.0_NG_DC.audit from CIS Azure Compute Microsoft Windows Server 2022 Benchmark v1.0.0 | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 NG DC | Windows | |
| CIS_Fedora_28_Family_Linux_Workstation_L1_v1.0.0.audit from CIS Fedora 19 Family Linux Benchmark v1.0.0 | CIS Fedora 19 Family Linux Workstation L1 v1.0.0 | Unix | |
| CIS_Fedora_28_Family_Linux_Workstation_L1_v1.0.0.audit from CIS Fedora 19 Family Linux Benchmark v1.0.0 | CIS Fedora 19 Family Linux Workstation L2 v1.0.0 | Unix | |
| CIS_Google_Chrome_Group_Policy_v1.0.0_L1.audit from CIS Google Chrome Group Policy Benchmark v1.0.0 | CIS Google Chrome Group Policy v1.0.0 L1 | Windows | |
| CIS_Microsoft_Windows_Server_2025_Stand-alone_v1.0.0_L2_MS.audit from CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 | CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 L2 MS | Windows | |
| CIS_Mozilla_Firefox_ESR_GPO_v1.0.0_L2.audit from CIS Mozilla Firefox ESR GPO Benchmark v1.0.0 | CIS Mozilla Firefox ESR GPO v1.0.0 L2 | Windows | |
| CIS_Palo_Alto_Firewall_8_Benchmark_L1_v1.0.0.audit from CIS Palo Alto Firewall 8 Benchmark v1.0.0 | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | |
| CIS_Palo_Alto_Firewall_8_Benchmark_L2_v1.0.0.audit from CIS Palo Alto Firewall 8 Benchmark v1.0.0 | CIS Palo Alto Firewall 8 Benchmark L2 v1.0.0 | Palo_Alto | |
| CIS_Red_Hat_Enterprise_Linux_9_STIG_v1.0.0_CAT_I.audit from CIS Red Hat Enterprise Linux 9 STIG Benchmark v1.0.0 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT I | Unix | |
| CIS_Red_Hat_Enterprise_Linux_9_STIG_v1.0.0_CAT_III.audit from CIS Red Hat Enterprise Linux 9 STIG Benchmark v1.0.0 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT III | Unix | |
| CIS_Ubuntu_Linux_22.04_LTS_STIG_v1.0.0_CAT_II.audit from CIS Ubuntu Linux 22.04 LTS STIG Benchmark v1.0.0 | CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT II | Unix | |
| CIS_Ubuntu_Linux_24.04_LTS_STIG_v1.0.0_CAT_I.audit from CIS Ubuntu Linux 24.04 LTS STIG Benchmark v1.0.0 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT I | Unix | |
| CIS_Ubuntu_Linux_24.04_LTS_STIG_v1.0.0_CAT_II.audit from CIS Ubuntu Linux 24.04 LTS STIG Benchmark v1.0.0 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II | Unix | |
| CIS_Ubuntu_Linux_24.04_LTS_STIG_v1.0.0_CAT_III.audit from CIS Ubuntu Linux 24.04 LTS STIG Benchmark v1.0.0 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT III | Unix | |
| F5BI-AP-300041 - The F5 BIG-IP appliance that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies. | DISA F5 BIG-IP TMOS ALG STIG v1r2 | F5 | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
| F5BI-LT-000303 - The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers. | DISA F5 BIG-IP Local Traffic Manager STIG v2r4 | F5 | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
| GOOG-14-013400 - Google Android 14 devices must have a Mobile Threat Detection (MTD) app installed. | AirWatch - DISA Google Android 14 COBO STIG v2r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-14-013400 - Google Android 14 devices must have a Mobile Threat Detection (MTD) app installed. | MobileIron - DISA Google Android 14 COBO STIG v2r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-14-013400 - Google Android 14 devices must have a Mobile Threat Detection (MTD) app installed. | AirWatch - DISA Google Android 14 COPE STIG v2r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-14-013400 - Google Android 14 devices must have a Mobile Threat Detection (MTD) app installed. | MobileIron - DISA Google Android 14 COPE STIG v2r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-15-013400 - Google Android 15 devices must have a Mobile Threat Detection (MTD) app installed. | AirWatch - DISA Google Android 15 COBO STIG v1r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-15-013400 - Google Android 15 devices must have a Mobile Threat Detection (MTD) app installed. | MobileIron - DISA Google Android 15 COBO STIG v1r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-15-013400 - Google Android 15 devices must have a Mobile Threat Detection (MTD) app installed. | AirWatch - DISA Google Android 15 COPE STIG v1r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-15-013400 - Google Android 15 devices must have a Mobile Threat Detection (MTD) app installed. | MobileIron - DISA Google Android 15 COPE STIG v1r3 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-16-013400 - Google Android 16 devices must have a Mobile Threat Detection (MTD) app installed. | AirWatch - DISA Google Android 16 COBO STIG v1r1 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-16-013400 - Google Android 16 devices must have a Mobile Threat Detection (MTD) app installed. | MobileIron - DISA Google Android 16 COBO STIG v1r1 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-16-013400 - Google Android 16 devices must have a Mobile Threat Detection (MTD) app installed. | AirWatch - DISA Google Android 16 COPE STIG v1r1 | MDM | CONFIGURATION MANAGEMENT |
| GOOG-16-013400 - Google Android 16 devices must have a Mobile Threat Detection (MTD) app installed. | MobileIron - DISA Google Android 16 COPE STIG v1r1 | MDM | CONFIGURATION MANAGEMENT |
| JUSX-VN-000008 - The Juniper SRX Services Gateway VPN must be configured to use IPsec with SHA256 or greater to negotiate hashing to protect the integrity of remote access sessions. | DISA Juniper SRX Services Gateway VPN v3r2 | Juniper | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
| OL09-00-000300 - OL 9 must have the Advanced Intrusion Detection Environment (AIDE) package installed. | DISA Oracle Linux 9 STIG v1r4 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
| PANW-IP-000043 - The Palo Alto Networks security platform must use a Vulnerability Protection Profile that blocks any critical, high, or medium threats. | DISA Palo Alto Networks IDPS STIG v3r2 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-06-000285 - The system must have a host-based intrusion detection tool installed - hipclient process | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
| SYMP-AG-000270 - Symantec ProxySG providing intermediary services for HTTP must inspect outbound HTTP traffic for protocol compliance and protocol anomalies - External | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
| UBTU-24-100840 - Ubuntu 24.04 LTS SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms. | DISA Canonical Ubuntu 24.04 LTS STIG v1r4 | Unix | ACCESS CONTROL |
| WBLC-02-000069 - Oracle WebLogic must generate audit records for the DoD-selected list of auditable events. | Oracle WebLogic Server 12c Windows v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
| WN12-CC-000065 - The detection of compatibility issues for applications and drivers must be turned off. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
| WN12-CC-000065 - The detection of compatibility issues for applications and drivers must be turned off. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |