1.3 Account Anti-riot Attack | Tenable ZTE ROSNG | ZTE_ROSNG | ACCESS CONTROL |
1.6 Support Web Access Security - c) version | Tenable ZTE ROSNG | ZTE_ROSNG | SYSTEM AND COMMUNICATIONS PROTECTION |
1.8 SSH Strong Algorithm - a) Disable encryption none | Tenable ZTE ROSNG | ZTE_ROSNG | SYSTEM AND COMMUNICATIONS PROTECTION |
3.3 Authentication and Verification of BGP Routing Protocols | Tenable ZTE ROSNG | ZTE_ROSNG | IDENTIFICATION AND AUTHENTICATION |
Adtran : Disable SSLv2 | TNS Adtran AOS Best Practice Audit | Adtran | CONFIGURATION MANAGEMENT |
Adtran : Enable NTP | TNS Adtran AOS Best Practice Audit | Adtran | |
Adtran : Enable service password-encryption | TNS Adtran AOS Best Practice Audit | Adtran | IDENTIFICATION AND AUTHENTICATION |
Adtran : Encrypt enable password | TNS Adtran AOS Best Practice Audit | Adtran | IDENTIFICATION AND AUTHENTICATION |
Adtran : Ensure DHCP is Disabled unless needed | TNS Adtran AOS Best Practice Audit | Adtran | CONFIGURATION MANAGEMENT |
Adtran : Ensure the log level is set at an appropriate setting | TNS Adtran AOS Best Practice Audit | Adtran | AUDIT AND ACCOUNTABILITY |
Adtran : SNMP 'PUBLIC' community string not used | TNS Adtran AOS Best Practice Audit | Adtran | IDENTIFICATION AND AUTHENTICATION |
F5BI-AS-000163 - To protect against data mining, The BIG-IP ASM module must be configured to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers. | DISA F5 BIG-IP Application Security Manager STIG v2r2 | F5 | ACCESS CONTROL |
F5BI-LT-000163 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects. | DISA F5 BIG-IP Local Traffic Manager STIG v2r4 | F5 | ACCESS CONTROL |
GEN006560 - The system vulnerability assessment tool, host-based intrusion detection tool, and file integrity tool must notify SA and IAO. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
Host version | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection. | DISA Juniper EX Series Layer 2 Switch v2r2 | Juniper | IDENTIFICATION AND AUTHENTICATION |
JUSX-IP-000017 - The Juniper Networks SRX Series Gateway IDPS must protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis. | DISA Juniper SRX Services Gateway IDPS v2r1 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
JUSX-IP-000025 - The IDPS must send an alert to, at a minimum, the ISSO and ISSM when DoS incidents are detected. | DISA Juniper SRX Services Gateway IDPS v2r1 | Juniper | SYSTEM AND INFORMATION INTEGRITY |
List crash dumps | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List halted VMs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List non-default VM templates | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List running VMs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List security roles | TNS Citrix Hypervisor | Unix | ACCESS CONTROL |
List virtual disks | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List VLANs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List VM CPU allocations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List VM memory allocations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
NTP client configured | TNS Citrix Hypervisor | Unix | AUDIT AND ACCOUNTABILITY |
PANW-IP-000024 - The Palo Alto Networks security platform must install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures. | DISA STIG Palo Alto IDPS v3r1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
Review accounts used to mount remote storage | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-651035 - RHEL 9 must be configured so that the file integrity tool verifies extended attributes. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - From | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | AUDIT AND ACCOUNTABILITY |
SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - Server | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | AUDIT AND ACCOUNTABILITY |
The hosts.deny file blocks access by default | TNS Citrix Hypervisor | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
TNS_BestPractice_Citrix_Hypervisor.audit | TNS Citrix Hypervisor | Unix | |
XAPI SSL certificate is in default location | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
XenServer - List bonded NIC groups | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List crash dumps | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List halted VMs | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List non-default VM templates | TNS Citrix XenServer | Unix | |
XenServer - List patches | TNS Citrix XenServer | Unix | SYSTEM AND INFORMATION INTEGRITY |
XenServer - List security roles | TNS Citrix XenServer | Unix | ACCESS CONTROL |
XenServer - List users | TNS Citrix XenServer | Unix | ACCESS CONTROL |
XenServer - List virtual disks | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List VLANs | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List VM CPU allocations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List VM memory allocations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - NTP client configured | TNS Citrix XenServer | Unix | AUDIT AND ACCOUNTABILITY |
XenServer - Review accounts used to mount remote storage | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - The hosts.allow file limits access to the local network | TNS Citrix XenServer | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |