Item Search

NameAudit NamePluginCategory
APPNET0066 - .NET default proxy settings must be reviewed and approved.DISA STIG for Microsoft Dot Net Framework 4.0 v2r4Windows

CONFIGURATION MANAGEMENT

DTOO137 - Prompts to convert older databases must be enforced.DISA STIG Microsoft Access 2013 v1r7Windows

CONFIGURATION MANAGEMENT

ESXI-06-200037 - The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by using Active Directory for local user authentication.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-300037 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using Active Directory for local user authentication.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

GEN000450 - The system must limit users to 10 simultaneous system logins, or a site-defined number, in accordance with operational requirements.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock - saverListDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN001440 - All interactive users must be assigned a home directory in the /etc/passwd file.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN001540 - All files and directories contained in interactive user's home directories must be owned by the home directory's owner.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/bashrc'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/environment'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/profile'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - /etc/environmentDISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - /usr/sbin/auditconfigDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - /usr/sbin/auditconfigDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - /usr/sbin/auditdDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/auditDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/auditdDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/auditreduceDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/bsmrecordDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/bsmrecordDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/prauditDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/audispd'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/autrace'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - /usr/sbin/auditDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - /usr/sbin/auditconfigDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - /usr/sbin/auditreduceDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - /usr/sbin/auditreduceDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/auditctl'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/ausearch'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN003504 - The centralized process core dump data directory must have mode 0700 or less permissive.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN003602 - The system must not process ICMP timestamp requests - dladm show-linkDISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN003611 - The system must log martian packets - 'net.ipv4.conf.all.log_martians'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003624 - The system must use a separate filesystem for /tmp (or equivalent).DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN003800 - Inetd or xinetd logging/tracing must be enabled.DISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN003860 - The system must not have the finger service active.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN004560 - The SMTP services SMTP greeting must not provide version information.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN004700 - The Sendmail service must not have the wizard backdoor active.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005524 - The SSH daemon must not permit GSSAPI authentication unless needed.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN005524 - The SSH daemon must not permit GSSAPI authentication unless needed.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005770 - The NFS exports configuration file must not have an extended ACL.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN006570 - The file integrity tool must be configured to verify ACLs - configDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006570 - The file integrity tool must be configured to verify ACLs - usedDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006571 - The file integrity tool must be configured to verify extended attributes - configDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN008420 - The system must use available memory address randomization techniques.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN008480 - The system must have USB Mass Storage disabled unless needed - systemDISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN008480 - The system must have USB Mass Storage disabled unless needed - systemDISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-020170 - OL 8 must require the change of at least eight characters when passwords are changed.DISA Oracle Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010007 - The Ubuntu operating system must enforce 24 hours/1 day as the minimum password lifetime. Passwords for new users must have a 24 hours/1 day minimum password lifetime restriction.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010008 - The Ubuntu operating system must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010051 - The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION