Item Search

NameAudit NamePluginCategory
F5BI-AP-300003 - The F5 BIG-IP appliance providing intermediary services for remote access must use FIPS-validated cryptographic algorithms, including TLS 1.2 at a minimum.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Java permissions - Locked-Down Local Machine ZoneMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Local Machine ZoneMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Local Machine ZoneMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Local Machine ZoneMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Local Machine ZoneMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Local Machine ZoneMSCT Windows Server 2025 DC v2506 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows 10 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows Server 1903 MS v1.19.9Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows Server v1909 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Restricted Sites ZoneMSCT Windows Server 2025 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Trusted Sites ZoneMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Trusted Sites ZoneMSCT Windows Server 2016 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Java permissions - Locked-Down Trusted Sites ZoneMSCT Windows Server 2019 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Network security: Allow LocalSystem NULL session fallbackMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Network security: Allow LocalSystem NULL session fallbackMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

Network security: Allow LocalSystem NULL session fallbackMSCT Windows 10 1909 v1.0.0Windows

ACCESS CONTROL

Network security: Allow LocalSystem NULL session fallbackMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Scripting of Java appletsMSCT Windows 11 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Scripting of Java appletsMSCT Windows 11 v25H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Scripting of Java appletsMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Scripting of Java appletsMSCT Windows Server 2025 MS v2506 v1.0.0Windows

CONFIGURATION MANAGEMENT

VCWN-06-000003 - The system must enforce a 60-day maximum password lifetime restriction.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000004 - The system must terminate management sessions after 10 minutes of inactivity.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000005 - The vCenter Server users must have the correct roles assigned.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000009 - The system must use Active Directory authentication.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000012 - The system must disable the distributed virtual switch health check.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000014 - The system must ensure the distributed port group MAC Address Change policy is set to reject.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000016 - The system must only send NetFlow traffic to authorized collectors.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000017 - The system must not override port group settings at the port level on distributed switches.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000018 - All port groups must be configured to a value other than that of the native VLAN.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000022 - The vCenter Server services must be ran using a service account instead of a built-in Windows account.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000025 - The system must disable the managed object browser at all times, when not required for troubleshooting or maintenance.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000026 - Privilege re-assignment must be checked after the vCenter Server restarts.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000036 - The system must produce audit records containing information to establish what type of events occurred.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

AUDIT AND ACCOUNTABILITY

VCWN-06-000042 - Passwords must contain at least one numeric character.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000043 - Passwords must contain at least one special character.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000045 - The system must limit the maximum number of failed login attempts to three.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

ACCESS CONTROL

VCWN-06-000046 - The system must set the interval for counting failed login attempts to at least 15 minutes.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

ACCESS CONTROL

VCWN-06-000047 - The system must require an administrator to unlock an account locked due to excessive login failures.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

ACCESS CONTROL

VCWN-06-000051 - The system must protect the confidentiality and integrity of transmitted info by isolating IP-based storage traffic.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-100005 - The vCenter Server users must have the correct roles assigned.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-00-000210 - Bluetooth must be turned off unless approved by the organization.DISA Microsoft Windows 10 STIG v3r6Windows

CONFIGURATION MANAGEMENT

WN11-00-000210 - Bluetooth must be turned off unless approved by the organization.DISA Microsoft Windows 11 STIG v2r7Windows

CONFIGURATION MANAGEMENT