Item Search

NameAudit NamePluginCategory
2.1.1.4 Ensure ntp is configured - restrict -6CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

2.2.1.2 Ensure ntp is configured - restrict -6CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

2.2.1.3 Ensure ntp is configured - restrict -6CIS CentOS 6 Server L1 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

2.2.1.3 Ensure ntp is configured - restrict -6CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

2.2.1.3 Ensure ntp is configured - restrict -6CIS Oracle Linux 6 Server L1 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

3.3.6 Secure the JDK 64-bit runtime libraryCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

CONFIGURATION MANAGEMENT

6.1.4 Set SSH MaxAuth Tries to 3 - Check if MaxAuthTries is set to 3 or lower and not commented for the server.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler exists in web application)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler exists in web application)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler exists inin default)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler exists inin default)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in default)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in default)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in default)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in default)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in web application)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in web application)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in default)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in default)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

DTBI091 - The Java Permissions must be set with High Safety (Trusted Sites zone).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

CONFIGURATION MANAGEMENT

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - The Internet Explorer Bind to Object functionality must be enabled.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Scripted Window Security must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO132 - File Downloads must be configured for proper restrictions.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO211 - ActiveX Installs must be configured for proper restriction.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO999-OneNote13 - The version of OneNote running on the system must be a supported version.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND INFORMATION INTEGRITY

FGFW-ND-000010 - The FortiGate device must automatically audit account modificationDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000030 - The FortiGate device must have only one local account to be used as the account of last resort in the event the authentication server is unavailable.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000055 - The FortiGate device must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000065 - The FortiGate device must generate audit records when successful/unsuccessful attempts to modify administrator privileges occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000115 - The FortiGate device must generate an immediate real-time alert of all audit failure events requiring real-time alerts.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000135 - The FortiGate device must protect audit tools from unauthorized access.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000145 - The FortiGate device must prohibit installation of software without explicit privileged status.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000170 - The FortiGate device must be running an operating system release that is currently supported by the vendor.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000180 - The FortiGate device must conduct backups of system-level information contained in the information system when changes occur.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

FGFW-ND-000200 - The FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accountsDISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000220 - The FortiGate device must enforce a minimum 15-character password length.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000225 - The FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000245 - The FortiGate device must use LDAPS for the LDAP connection.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000255 - The FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000275 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000285 - The FortiGate device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000305 - The FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT