Item Search

NameAudit NamePluginCategory
AIOS-18-012200 - Apple iOS/iPadOS 18 must implement the management setting: enable USB Restricted Mode.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-012300 - Apple iOS/iPadOS 18 must not allow managed apps to write contacts to unmanaged contacts accounts.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-013100 - Apple iOS/iPadOS 18 must disable 'Find My Friends' in the 'Find My' app - Find My app.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-014400 - Apple iOS/iPadOS 18 must disable connections to Siri servers for the purpose of dictation.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-014900 - Apple iOS/iPadOS 18 must disable the installation of alternative marketplace apps.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

ALMA-09-011900 - AlmaLinux OS 9 cron configuration files directory must be owned by root.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-012560 - All AlmaLinux OS 9 local files and directories must have a valid owner.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-013220 - AlmaLinux OS 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-014430 - AlmaLinux OS 9 must disable the user list at logon for graphical user interfaces.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-015310 - All AlmaLinux OS 9 local interactive user home directories must have mode 0750 or less permissive.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-015420 - AlmaLinux OS 9 must not allow unattended or automatic logon via the graphical user interface.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-016190 - AlmaLinux OS 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-016520 - AlmaLinux OS 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-016850 - AlmaLinux OS 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-017180 - AlmaLinux OS 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-017510 - AlmaLinux OS 9 must set the umask value to 077 for all local interactive user accounts.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-018390 - AlmaLinux OS 9 must prevent the use of dictionary words for passwords.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-018500 - AlmaLinux OS 9 must not accept router advertisements on all IPv6 interfaces.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-019600 - AlmaLinux OS 9 must have the nss-tools package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-020370 - AlmaLinux OS 9 SSH daemon must not allow compression or must only allow compression after successful authentication.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-020920 - AlmaLinux OS 9 SSH private host key files must have mode 0640 or less permissive.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-021140 - AlmaLinux OS 9 SSH daemon must not allow known hosts authentication.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-021470 - AlmaLinux OS 9 SSH daemon must disable remote X connections for interactive users.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-021910 - AlmaLinux OS 9 effective dconf policy must match the policy keyfiles.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-022130 - All AlmaLinux OS 9 local initialization files must have mode 0740 or less permissive.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-022680 - AlmaLinux OS 9 must prevent special devices on file systems that are used with removable media.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-023890 - The root account must be the only account having unrestricted access to an AlmaLinux OS 9 system.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-024000 - AlmaLinux OS 9 must be configured so that the cryptographic hashes of system files match vendor values.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-024110 - AlmaLinux OS 9 must clear the page allocator to prevent use-after-free attacks.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-024990 - AlmaLinux OS 9 system accounts must not have an interactive login shell.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-025320 - AlmaLinux OS 9 must use a separate file system for /var/log.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

ALMA-09-025650 - AlmaLinux OS 9 must disable virtual system calls.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

CISC-RT-000236 - The Cisco switch must be configured to advertise a hop limit of at least 32 in Switch Advertisement messages for IPv6 stateless auto-configuration deployments.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000237 - The Cisco router must not be configured to use IPv6 Site Local Unicast addresses.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000391 - The Cisco perimeter switch must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

CONFIGURATION MANAGEMENT

GOOG-13-009800 - Google Android 13 users must complete required training.MobileIron - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-010200 - The Google Android 13 work profile must be configured to enforce the system application disable list.AirWatch - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-010600 - Google Android 13 must be configured to disallow configuration of date and time.AirWatch - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-010600 - Google Android 13 must be configured to disallow configuration of date and time.MobileIron - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-011000 - Android 13 devices must be configured to enable Common Criteria Mode (CC Mode) - CC Mode.MobileIron - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

JUEX-RT-000980 - The Juniper Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.DISA Juniper EX Series Router v2r1Juniper

CONFIGURATION MANAGEMENT

JUEX-RT-001010 - The Juniper perimeter router must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA Juniper EX Series Router v2r1Juniper

CONFIGURATION MANAGEMENT

JUEX-RT-001020 - The Juniper router must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.DISA Juniper EX Series Router v2r1Juniper

CONFIGURATION MANAGEMENT

VCSA-80-000271 - The vCenter Server must only send NetFlow traffic to authorized collectors.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000272 - The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000277 - The vCenter Server must be isolated from the public internet but must still allow for patch notification and delivery.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000281 - The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000285 - The vCenter Server must restrict access to cryptographic permissions.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000288 - The vCenter Server must use secure Lightweight Directory Access Protocol (LDAPS) when adding an LDAP identity source.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000295 - The vCenter server must require authentication for published content libraries.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT