Item Search

NameAudit NamePluginCategory
ARST-RT-000710 - The MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

CONFIGURATION MANAGEMENT

HONW-13-006500 - Honeywell Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].AirWatch - DISA Honeywell Android 13 COBO v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-006500 - Honeywell Android 13 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].MobileIron - DISA Honeywell Android 13 COBO v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-009800 - Honeywell Android 13 users must complete required training.MobileIron - DISA Honeywell Android 13 COBO v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-009800 - Honeywell Android 13 users must complete required training.AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-009900 - Honeywell Android 13 must be configured to enforce that Wi-Fi Sharing is disabled.AirWatch - DISA Honeywell Android 13 COBO v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-010000 - Honeywell Android 13 must have the DOD root and intermediate PKI certificates installed.MobileIron - DISA Honeywell Android 13 COBO v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-010000 - Honeywell Android 13 must have the DOD root and intermediate PKI certificates installed.AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-010000 - Honeywell Android 13 must have the DOD root and intermediate PKI certificates installed.MobileIron - DISA Honeywell Android 13 COPE v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-010300 - Honeywell Android 13 must be provisioned as a fully managed device and configured to create a work profile.AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-010500 - The Honeywell Android 13 work profile must be configured to disable the autofill services.MobileIron - DISA Honeywell Android 13 COPE v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-010800 - Android 13 devices must have the latest available Honeywell Android 13 operating system installed.AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

CONFIGURATION MANAGEMENT

HONW-13-011000 - Android 13 devices must be configured to enable Common Criteria (CC) mode.MobileIron - DISA Honeywell Android 13 COBO v1r1MDM

CONFIGURATION MANAGEMENT

OL08-00-010424 - OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010472 - OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010480 - The OL 8 SSH public host key files must have mode "0644" or less permissive.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010520 - The OL 8 SSH daemon must not allow authentication using known host's authentication.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010540 - OL 8 must use a separate file system for "/var".DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010542 - OL 8 must use a separate file system for the system audit data path.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010561 - OL 8 must have the rsyslog service enabled and active.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010600 - OL 8 file systems must not interpret character or block special devices from untrusted file systems.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010640 - OL 8 file systems must not interpret character or block special devices that are imported via NFS.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010674 - OL 8 must disable storing core dumps.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010690 - Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010710 - All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010741 - OL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010790 - All OL 8 files and directories must have a valid group owner.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-010800 - A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020101 - OL 8 must ensure the password complexity module is enabled in the system-auth file.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020103 - OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020320 - OL 8 must not have unnecessary accounts.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020332 - OL 8 must not allow blank or null passwords in the password-auth file.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-020352 - OL 8 must set the umask value to 077 for all local interactive user accounts.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-030010 - Cron logging must be implemented in OL 8.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040022 - OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040170 - The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 8.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040190 - The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for OL 8 operational support.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040279 - OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040283 - OL 8 must restrict exposed kernel pointer addresses access.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040300 - The OL 8 file integrity tool must be configured to verify extended attributes.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040310 - The OL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040321 - The graphical display manager must not be the default target on OL 8 unless approved.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

OL08-00-040380 - OL 8 must not have the "iprutils" package installed if not required for operational support.DISA Oracle Linux 8 STIG v2r5Unix

CONFIGURATION MANAGEMENT

RHEL-07-010063 - The Red Hat Enterprise Linux operating system must disable the login screen user list for graphical user interfaces.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-010291 - The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-010339 - The Red Hat Enterprise Linux operating system must specify the default 'include' directory for the /etc/sudoers file - include directory for the /etc/sudoers file.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-08-010561 - The rsyslog service must be running in RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010590 - RHEL 8 must prevent code from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010620 - RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010671 - RHEL 8 must disable the kernel.core_pattern.DISA Red Hat Enterprise Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT