Item Search

NameAudit NamePluginCategory
AIOS-15-013200 - The Apple iOS/iPadOS 15 must be supervised by the MDM.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-013400 - The Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-707000 - Apple iOS/iPadOS 16 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-001000 - Apple iOS/iPadOS 17 must allow the Administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: other methods] - MDM to perform the following management function: enable/disable VPN protection across the device and [selection: other methods].MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-012400 - Apple iOS/iPadOS 17 must not allow unmanaged apps to read contacts from managed contacts accounts.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-013500 - Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DOD security requirements.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-014700 - Apple iOS/iPadOS 17 must have DOD root and intermediate PKI certificates installed.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-701000 - Apple iOS/iPadOS 17 must allow the administrator (MDM) to perform the following management function: enable/disable VPN protection across the device - MDM to perform the following management function: enable/disable VPN protection across the device and [selection: other methods].MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-707400 - Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics:MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-712400 - Apple iOS/iPadOS 17 must not allow unmanaged apps to read contacts from managed contacts accounts.AirWatch - DISA Apple iOS/iPadOS 17 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-712400 - Apple iOS/iPadOS 17 must not allow unmanaged apps to read contacts from managed contacts accounts.MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-014300 - Apple iOS/iPadOS 18 must disable 'Allow network drive access in Files access' - Allow network drive access in Files access.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-015400 - Apple iOS/iPadOS 18 must disable ChatGPT connection for Apple Intelligence.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIX7-00-002142 - The AIX /etc/hosts file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002150 - The AIX cron and crontab directories must be group-owned by cron.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - EnableAssessmentDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002060 - The macOS system must allow only applications that have a valid digital signature to run - Unsigned ApplicationsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002066 - The macOS system must not allow an unattended or automatic logon to the system.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User directory home permissionsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Public Access Control ListsDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-003013 - Apple macOS must be configured with a firmware password to prevent access to single user mode and booting from alternative media.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-003013 - Apple macOS must be configured with a firmware password to prevent access to single user mode and booting from alternative media.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-003050 - The macOS system must be configured so that the login command requires smart card authentication.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-003050 - The macOS system must be configured so that the login command requires smart card authentication.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-003052 - The macOS system must be configured so that the sudo command requires smart card authentication.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-005050 - The macOS Application Firewall must be enabled - EnableFirewallDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-005050 - The macOS Application Firewall must be enabled - EnableFirewallDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-005051 - The macOS system must restrict the ability to utilize external writeable media devices.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-100001 - The macOS system must be a supported release.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-13-002050 - The macOS system must disable the Screen Sharing feature.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-003012 - The macOS system must be configured to prevent displaying password hints.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-003013 - The macOS system must be configured with a firmware password to prevent access to single user mode and booting from alternative media.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-13-005051 - The macOS system must restrict the ability of individuals to use USB storage devices.DISA STIG Apple macOS 13 v1r5Unix

CONFIGURATION MANAGEMENT

CNTR-K8-003130 - The Kubernetes conf files must be owned by root.DISA STIG Kubernetes v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-020103 - The SUSE operating system must use the invoking user's password for privilege escalation when using 'sudo' - sudo.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-020181 - The SUSE operating system must not have accounts configured with blank or null passwords.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040040 - The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040100 - All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040160 - SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040190 - SUSE operating system kernel core dumps must be disabled unless needed.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040210 - The SUSE operating system must use a separate file system for /var.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040310 - The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040320 - The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040330 - The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SLES-15-040380 - The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.DISA SLES 15 STIG v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-24-100600 - Ubuntu 24.04 LTS must have the "libpam-pwquality" package installed.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300017 - Ubuntu 24.04 LTS must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300022 - Ubuntu 24.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300027 - Ubuntu 24.04 LTS must not have accounts configured with blank or null passwords.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300029 - Ubuntu 24.04 LTS must generate audit records for all events that affect the systemd journal files.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT