Item Search

NameAudit NamePluginCategory
AOSX-14-000013 - The macOS system must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-15-000012 - The macOS system must automatically remove or disable temporary and emergency user accounts after 72 hours.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

ESXI-80-000049 - The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

F5BI-DM-000015 - The BIG-IP appliance must automatically remove or disable temporary user accounts after 72 hours.DISA F5 BIG-IP Device Management STIG v2r4F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

F5BI-DM-000149 - The BIG-IP appliance must be configured to automatically remove or disable emergency accounts after 72 hours.DISA F5 BIG-IP Device Management STIG v2r4F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

VCSA-70-000059 - The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

VCSA-80-000059 - The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

WN19-00-000310 - Windows Server 2019 must automatically remove or disable emergency accounts after the crisis is resolved or within 72 hours.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL