Item Search

NameAudit NamePluginCategory
ADBP-XI-001280 - Adobe Acrobat Pro XI Default Handler changes must be disabled.DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2Windows

CONFIGURATION MANAGEMENT

ADBP-XI-001325 - Adobe Acrobat Pro XI privileged site locations must be disabled.DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2Windows

CONFIGURATION MANAGEMENT

AIOS-18-010950 - Apple iOS/iPadOS 18 must implement the management setting: require passcode for incoming Airplay connection requests.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL

ALMA-09-053040 - AlmaLinux OS 9 must be configured to forward audit records via TCP to a different system or media from the system being audited via rsyslog.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

APPL-11-000006 - The macOS system must conceal, via the session lock, information previously visible on the display with a publicly viewable image.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-13-001030 - The macOS system must provide an immediate warning to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated audit record storage volume reaches 75 percent of repository maximum audit record storage capacity.DISA STIG Apple macOS 13 v1r5Unix

AUDIT AND ACCOUNTABILITY

ARST-RT-000060 - The Arista BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000290 - The MPLS router with RSVP-TE enabled must be configured with message pacing or refresh reduction to adjust maximum number of RSVP messages to an output queue based on the link speed and input queue size of adjacent core routers.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000310 - The PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS DODIN Technical Profile.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

EDGE-00-000004 - The list of domains for which Microsoft Defender SmartScreen will not trigger warnings must be allowlisted if used.DISA STIG Edge v2r2Windows

MAINTENANCE

EX19-MB-000121 - Exchange mailbox stores must mount at startup.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000123 - Exchange mail quota settings must not restrict sending mail.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000127 - Exchange receive connectors must control the number of recipients per message.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000128 - Exchange message size restrictions must be controlled on send connectors.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000132 - The Exchange Outbound Connection Timeout must be 10 minutes or less.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000142 - The Exchange Global Recipient Count Limit must be set.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

F5BI-AP-000235 - The F5 BIG-IP appliance APM Access Policies that grant access to web application resources must allow only client certificates that have the User Persona Name (UPN) value in the User Persona Client Certificates.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000242 - The F5 BIG-IP appliance must be configured to enable the 'Secure' cookie flag - Secure cookie flag.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-AP-000243 - The F5 BIG-IP appliance must be configured to disable the 'Persistent' cookie flag - Persistent cookie flag.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

FNFG-FW-000150 - The FortiGate firewall must generate an alert that can be forwarded to, at a minimum, the Information System Security Officer (ISSO) and Information System Security Manager (ISSM) when denial-of-service (DoS) incidents are detected. - set certificateDISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND INFORMATION INTEGRITY

FNFG-FW-000150 - The FortiGate firewall must generate an alert that can be forwarded to, at a minimum, the Information System Security Officer (ISSO) and Information System Security Manager (ISSM) when denial-of-service (DoS) incidents are detected. - set serverDISA Fortigate Firewall STIG v1r3FortiGate

SYSTEM AND INFORMATION INTEGRITY

GEN001290 - All manual page files must not have extended ACLs - '/usr/share/man/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001440 - All interactive users must be assigned a home directory in the /etc/passwd file.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN002500 - The sticky bit must be set on all public directories.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditmerge'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/auditpr'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/audit'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditpr'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditstream'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditpr'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditmerge'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003620 - A separate file system must be used for user home directories (such as /home or equivalent).DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000060 - The Juniper BGP router must be configured to reject route advertisements from BGP peers that do not list their autonomous system (AS) number as the first AS in the AS_PATH attribute.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000100 - The Juniper router configured for BGP must reject route advertisements from CE routers with an originating AS in the AS_PATH attribute that does not belong to that customer.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

MSFT-11-005200 - The mobile operating system must allow only the Administrator (MDM) to perform the following management function: Enable/disable location services - EMM to perform the following management function: Enable/disable location services.MobileIron - DISA Microsoft Android 11 COBO v1r2MDM

ACCESS CONTROL

MSFT-11-005200 - The mobile operating system must allow only the Administrator (MDM) to perform the following management function: Enable/disable location services.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

ACCESS CONTROL

OL08-00-040026 - OL 8 must disable IEEE 1394 (FireWire) Support.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040180 - OL 8 must disable the debug-shell systemd service.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010440 - YUM must remove all software components after updated versions have been installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-214035 - RHEL 9 must remove all software components after updated versions have been installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

SHPT-00-000405 - To support audit review, analysis, and reporting, SharePoint must integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.DISA STIG SharePoint 2010 v1r9Windows

AUDIT AND ACCOUNTABILITY

SPLK-CL-000160 - Splunk Enterprise must be configured to send an immediate alert to the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity - at a minimum when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

AUDIT AND ACCOUNTABILITY

SQL2-00-015500 - Database software directories, including SQL Server configuration files, must be stored in dedicated directories, separate from the host OS and other applications.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

UBTU-20-010300 - The Ubuntu operating system must have a crontab script running weekly to offload audit events of standalone systems.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010441 - The Ubuntu operating system must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-22-653020 - Ubuntu 22.04 LTS audit event multiplexor must be configured to offload audit logs onto a different system from the system being audited.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-400340 - Ubuntu 24.04 LTS must be configured such that Pluggable Authentication Module (PAM) prohibits the use of cached authentications after one day.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

WBSP-AS-001520 - The WebSphere Application Server must not generate LTPA keys automatically.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001530 - The WebSphere Application Server must periodically regenerate LTPA keys.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION