2.021 - Remove Software Certificate Installation Files | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.047 - The Smart Card removal option is set to take no action. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.074 - The system is not configured to force users to log off when their allowed logon hours expire. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.077 - The system is not configured to use FIPS compliant Algorithms for Encryption, Hashing, and Signing. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.088 - The system is not configured to use Safe DLL Search Mode. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.122 - Administrator Passwords are changed when necessary. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.132 - User Account Control - Detect Application Installations | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.008 - Auditing must be configured as required. - 'Logon/Logoff -> Logon' | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
4.008 - Auditing must be configured as required. - 'Privilege Use -> Sensitive Privilege Use' | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
4.010 - User rights assignments must meet minimum requirements. - Change the system time | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Create a token object | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Enable computer and user accounts to be trusted for delegation | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Lock pages in memory | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Perform volume maintenance tasks | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.002 - Event log sizes do not meet minimum requirements. - System | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
5.027 - The system is configured to allow remote desktop sharing through NetMeeting. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.135 - Hide mechanism for removing Zone information from file attachments. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.140 - The HBSS McAfee Agent is not installed. - FrameworkService | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.200 - Network - Mapper I/O Driver - ProhibitLLTDIOOnPrivateNet | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.201 - Network - Responder Driver - EnableRspndr | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.203 - Prohibit Network Bridge in Windows | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
GEN005040 - All FTP users must have a default umask of 077. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005120 - The TFTP daemon must be configured to vendor specs including a home directory owned by the TFTP user - 'tftp user shell' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005340 - Management Information Base (MIB) files must have mode 0640 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005360 - The snmpd.conf file must be owned by root - '/etc/snmpdv3.conf' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005365 - The snmpd.conf file must be group-owned by bin, sys, or system - '/etc/snmpd.conf' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005460 - The system must only use remote syslog servers (log hosts) justified and documented using site-defined procedures. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005522 - The SSH public host key files must have mode 0644 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005536 - The SSH daemon must perform strict mode checking of home directory configuration files. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005537 - The SSH daemon must use privilege separation. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005540 - The SSH daemon must be configured for IP filtering - '/etc/hosts.allow' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005550 - The SSH daemon must be configured with the Department of Defense (DoD) logon banner - 'Banner file has been defined' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005560 - The system must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005580 - A system used for routing must not run other network services or applications. | DISA STIG AIX 5.3 v1r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005740 - The NFS export configuration file must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006100 - The /usr/lib/smb.conf file must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006240 - The system must not run an Internet Network News (INN) server. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006310 - The /etc/news/nnrp.access file must not have an extended ACL. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006600 - The system's access control program must log each system access attempt - 'mail.none' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - '/etc/hosts.allow' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006640 - The system must use and update a DoD-approved virus scan program - 'scan.dat' | DISA STIG AIX 5.3 v1r2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN006640 - The system must use and update a DoD-approved virus scan program - 'scan.dat' - update date | DISA STIG AIX 5.3 v1r2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN007020 - The Stream Control Transmission Protocol (SCTP) must be disabled unless required. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN007480 - The Reliable Datagram Sockets (RDS) protocol must be disabled or not installed unless required. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN007820 - The system must not have IP tunnels configured - 'lstun -a' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN007850 - The DHCP client must not send dynamic DNS updates - 'updateDNS exists in /etc/dhcpcd.ini' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN007950 - The system must not respond to ICMPv6 echo requests sent to a broadcast address. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN008080 - If the system is using LDAP the /etc/ldap.conf file must be owned by root | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN008200 - The LDAP TLS certificate authority file must not have an extended ACL | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN008380 - A root kit check tool must be run on the system at least weekly. | DISA STIG AIX 5.3 v1r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |