Item Search

NameAudit NamePluginCategory
1.6 Ensure Install Security Responses and System Files Is EnabledCIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6 Ensure Install Security Responses and System Files Is EnabledCIS Apple macOS 15.0 Sequoia v1.0.0 L1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.2.1.2 Ensure the Time Service Is EnabledCIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.2 Ensure the Time Service Is EnabledCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.3.2.2 Ensure the Time Service Is EnabledCIS Apple macOS 13.0 Ventura v3.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.3.2.2 Ensure the Time Service Is EnabledCIS Apple macOS 14.0 Sonoma v2.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.3.3.9 Ensure Content Caching Is DisabledCIS Apple macOS 14.0 Sonoma v2.0.0 L2Unix

CONFIGURATION MANAGEMENT

2.4.8 Disable File Sharing - AppleFileServerCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.8 Disable File Sharing - AppleFileServerCIS Apple macOS 10.13 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.4.8 Disable File Sharing - SMBCIS Apple macOS 10.13 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.4.8 Disable File Sharing - SMBCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4.8 Ensure File Sharing Is Disabled - AppleFileServerCIS Apple macOS 10.14 v2.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.4.8 Ensure File Sharing Is Disabled - SMBCIS Apple macOS 10.14 v2.0.0 L1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

7.9 Apple ID password resetCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.9 Apple ID password resetCIS Apple OSX 10.9 L2 v1.3.0Unix
APPL-13-002069 - The macOS system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.DISA STIG Apple macOS 13 v1r5Unix

ACCESS CONTROL

APPL-13-003001 - The macOS system must issue or obtain public key certificates under an appropriate certificate policy from an approved service provider.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-003008 - The macOS system must enforce a 60-day maximum password lifetime restriction.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION

APPL-13-003009 - The macOS system must prohibit password reuse for a minimum of five generations.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION

APPL-13-003011 - The macOS system must enforce password complexity by requiring that at least one special character be used.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION

APPL-13-004022 - The macOS system must require users to reauthenticate for privilege escalation when using the "sudo" command.DISA STIG Apple macOS 13 v1r5Unix

IDENTIFICATION AND AUTHENTICATION

APPL-13-005052 - The macOS system logon window must be configured to prompt for username and password.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-005053 - The macOS system must restrict the ability of individuals to write to external optical media.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-005055 - The macOS system must be configured to disable prompts to configure ScreenTime.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

DISA_Microsoft_Exchange_2019_Edge_Server_STIG_v2r2.audit from DISA Microsoft Exchange 2019 Edge Server v2r2 STIGDISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows
DISA_Microsoft_Exchange_2019_Mailbox_Server_STIG_v2r2.audit from DISA Microsoft Exchange 2019 Mailbox Server v2r2 STIGDISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows
DISA_MongoDB_Enterprise_Advanced_7.x_STIG_v1r1_Unix.audit from DISA MongoDB Enterprise Advanced 7.x STIG v1r1DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix
DISA_Red_Hat_Enterprise_Linux_8_STIG_v2r3.audit from DISA Red Hat Enterprise Linux 8 STIG v2r3DISA Red Hat Enterprise Linux 8 STIG v2r3Unix
DISA_Red_Hat_Enterprise_Linux_9_STIG_v2r4.audit from DISA Red Hat Enterprise Linux 9 STIG v2r4DISA Red Hat Enterprise Linux 9 STIG v2r4Unix
DISA_STIG_AIX_7.x_v3r1.audit from DISA IBM AIX 7.x v3r1 STIGDISA STIG AIX 7.x v3r1Unix
DISA_STIG_Apache_Site-2.4_Unix_v2r6_Middleware.audit from DISA Apache Server 2.4 UNIX Site v2r6 STIGDISA STIG Apache Server 2.4 Unix Site v2r6 MiddlewareUnix
DISA_STIG_Cisco_IOS_XE_Router_NDM_v3r2.audit from DISA Cisco IOS XE Router NDM v3r2 STIGDISA STIG Cisco IOS XE Router NDM v3r2Cisco
DISA_STIG_Cisco_IOS_XE_Switch_L2S_v3r1.audit from DISA Cisco IOS XE Switch L2S v3r1 STIGDISA STIG Cisco IOS XE Switch L2S v3r1Cisco
DISA_STIG_Cisco_IOS_XE_Switch_NDM_v3r2.audit from DISA Cisco IOS XE Switch NDM v3r2 STIGDISA STIG Cisco IOS XE Switch NDM v3r2Cisco
DISA_STIG_Cisco_IOS_XE_Switch_RTR_v3r1.audit from DISA Cisco IOS XE Switch RTR v3r1 STIGDISA STIG Cisco IOS XE Switch RTR v3r1Cisco
DISA_STIG_JBoss_EAP_6.3_v2r6.audit from DISA JBoss Enterprise Application Platform 6.3 v2r6 STIGDISA JBoss EAP 6.3 STIG v2r6Unix
DISA_STIG_McAfee_VirusScan_8.8_Local_Client_v6r1.audit from DISA McAfee VirusScan 8.8 Local Client v6r1 STIGDISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows
DISA_STIG_Microsoft_Exchange_2013_Mailbox_Server_v2r3.audit from DISA Microsoft Exchange 2013 Mailbox Server v2r3 STIGDISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

DISA_STIG_Microsoft_Exchange_2016_Mailbox_Server_v2r6.audit from DISA Microsoft Exchange 2016 Mailbox Server v2r6 STIGDISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

DISA_STIG_Microsoft_Skype_Business_2016_v1r1.audit from DISA STIG Microsoft Skype for Business 2016 v1r1DISA STIG Microsoft Skype for Business 2016 v1r1Windows
DISA_STIG_Red_Hat_Enterprise_Linux_7_v3r15.audit from DISA Red Hat Enterprise Linux 7 v3r15 STIGDISA Red Hat Enterprise Linux 7 STIG v3r15Unix
DISA_STIG_RHEL_5_v1r18.audit from DISA Red Hat Enterprise Linux 5 STIG v1r18DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix
DISA_STIG_RHEL_6_v2r2.audit from DISA Red Hat Enterprise Linux 6 v2r2 STIGDISA Red Hat Enterprise Linux 6 STIG v2r2Unix
DISA_STIG_VMware_vSphere_6.7_EAM_Tomcat_v1r4.audit from DISA VMware vSphere 6.7 EAM Tomcat v1r4 STIGDISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix
DISA_STIG_VMware_vSphere_6.7_Photon_OS_v1r6.audit from DISA VMware vSphere 6.7 Photon OS v1r6 STIGDISA STIG VMware vSphere 6.7 Photon OS v1r6Unix
DISA_STIG_VMware_vSphere_6.7_STS_Tomcat_v1r3.audit from DISA VMware vSphere 6.7 STS Tomcat v1r3 STIGDISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix
DISA_STIG_VMware_vSphere_6.7_UI_Tomcat_v1r3.audit from DISA VMware vSphere 6.7 UI Tomcat v1r3 STIGDISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix
DISA_STIG_VMware_vSphere_6.7_Virgo_Client_v1r2.audit from DISA VMware vSphere 6.7 Virgo-Client v1r2 STIGDISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix
DISA_SUSE_Linux_Enterprise_Server_15_STIG_v2r4.audit from DISA SUSE Linux Enterprise Server 15 STIG v2r4DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix
F5BI-AP-000235 - The F5 BIG-IP appliance APM Access Policies that grant access to web application resources must allow only client certificates that have the User Persona Name (UPN) value in the User Persona Client Certificates.DISA F5 BIG-IP Access Policy Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION