AIOS-12-003600 - Apple iOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device. | MobileIron - DISA Apple iOS 12 v2r1 | MDM | CONFIGURATION MANAGEMENT |
AIOS-12-003600 - Apple iOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device. | AirWatch - DISA Apple iOS 12 v2r1 | MDM | CONFIGURATION MANAGEMENT |
AIOS-13-003600 - Apple iOS/iPadOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device. | AirWatch - DISA Apple iOS/iPadOS 13 v2r1 | MDM | CONFIGURATION MANAGEMENT |
AIOS-13-003600 - Apple iOS/iPadOS must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device. | MobileIron - DISA Apple iOS/iPadOS 13 v2r1 | MDM | CONFIGURATION MANAGEMENT |
AIX7-00-003025 - AIX must employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. | DISA STIG AIX 7.x v2r9 | Unix | CONFIGURATION MANAGEMENT |
GEN002420 - Removable media, remote file systems, and any file system that does not contain approved setuid files must be mounted with the 'nosuid' option - /etc/vfstab | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002420 - Removable media, remote file systems, and any file system that does not contain approved setuid files must be mounted with the 'nosuid' option - /etc/vfstab | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002420 - Removable media, remote file systems, and any file system that does not contain approved setuid files must be mounted with the 'nosuid' option - zfs get | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002420 - Removable media, remote file systems, and any file system that does not contain approved setuid files must be mounted with the 'nosuid' option - zfs get | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL6-00-000530 - The Oracle Linux operating system must mount /dev/shm with the nodev option. | DISA STIG Oracle Linux 6 v2r7 | Unix | CONFIGURATION MANAGEMENT |
OL6-00-000531 - The Oracle Linux operating system must mount /dev/shm with the nosuid option. | DISA STIG Oracle Linux 6 v2r7 | Unix | CONFIGURATION MANAGEMENT |
OL6-00-000532 - The Oracle Linux operating system must mount /dev/shm with the noexec option. | DISA STIG Oracle Linux 6 v2r7 | Unix | CONFIGURATION MANAGEMENT |
OL07-00-021024 - The Oracle Linux operating system must mount /dev/shm with secure options. | DISA Oracle Linux 7 STIG v2r14 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-040135 - The OL 8 'fapolicy' module must be installed. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-040136 - The OL 8 'fapolicy' module must be enabled. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-040137 - The OL 8 fapolicy module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs. | DISA Oracle Linux 8 STIG v1r9 | Unix | CONFIGURATION MANAGEMENT |
RHEL-06-000530 - The Red Hat Enterprise Linux operating system must mount /dev/shm with the nodev option. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
RHEL-06-000531 - The Red Hat Enterprise Linux operating system must mount /dev/shm with the nosuid option. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
RHEL-06-000532 - The Red Hat Enterprise Linux operating system must mount /dev/shm with the noexec option. | DISA Red Hat Enterprise Linux 6 STIG v2r2 | Unix | CONFIGURATION MANAGEMENT |
RHEL-07-021024 - The Red Hat Enterprise Linux operating system must mount /dev/shm with secure options. | DISA Red Hat Enterprise Linux 7 STIG v3r14 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231050 - RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231100 - RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot directory. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231105 - RHEL 9 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231110 - RHEL 9 must mount /dev/shm with the nodev option. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231125 - RHEL 9 must mount /tmp with the nodev option. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231165 - RHEL 9 must mount /var/log/audit with the noexec option. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-231175 - RHEL 9 must mount /var/tmp with the nodev option. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-433010 - RHEL 9 fapolicy module must be installed. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-433015 - RHEL 9 fapolicy module must be enabled. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
SLES-15-010390 - SUSE operating system AppArmor tool must be configured to control whitelisted applications and user home directory access control. | DISA SLES 15 STIG v1r12 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications. | DISA STIG Solaris 11 X86 v2r10 | Unix | CONFIGURATION MANAGEMENT |
SOL-11.1-020230 - The operating system must employ automated mechanisms to prevent program execution in accordance with the organization-defined specifications. | DISA STIG Solaris 11 SPARC v2r10 | Unix | CONFIGURATION MANAGEMENT |
UBTU-16-010610 - The Apparmor module must be configured to employ a deny-all, permit-by-exception policy to allow the execution of authorized software programs and limit the ability of non-privileged users to grant other users direct access to the contents of their home directories/folders. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | CONFIGURATION MANAGEMENT |
UBTU-18-010441 - The Ubuntu operating system must be configured to use AppArmor. | DISA STIG Ubuntu 18.04 LTS v2r14 | Unix | CONFIGURATION MANAGEMENT |
UBTU-20-010439 - The Ubuntu operating system must be configured to use AppArmor. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
WN10-CC-000180 - Autoplay must be turned off for non-volume devices. | DISA Windows 10 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000185 - The default autorun behavior must be configured to prevent autorun commands. | DISA Windows 10 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN10-CC-000190 - Autoplay must be disabled for all drives. | DISA Windows 10 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000072 - Autoplay must be turned off for non-volume devices. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000072 - Autoplay must be turned off for non-volume devices. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000073 - The default Autorun behavior must be configured to prevent Autorun commands. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000073 - The default Autorun behavior must be configured to prevent Autorun commands. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000074 - Autoplay must be disabled for all drives. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000074 - Autoplay must be disabled for all drives. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN16-CC-000250 - AutoPlay must be turned off for non-volume devices. | DISA Windows Server 2016 STIG v2r8 | Windows | CONFIGURATION MANAGEMENT |
WN16-CC-000260 - The default AutoRun behavior must be configured to prevent AutoRun commands. | DISA Windows Server 2016 STIG v2r8 | Windows | CONFIGURATION MANAGEMENT |
WN16-CC-000270 - AutoPlay must be disabled for all drives. | DISA Windows Server 2016 STIG v2r8 | Windows | CONFIGURATION MANAGEMENT |
WN19-CC-000210 - Windows Server 2019 Autoplay must be turned off for non-volume devices. | DISA Windows Server 2019 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN19-CC-000220 - Windows Server 2019 default AutoRun behavior must be configured to prevent AutoRun commands. | DISA Windows Server 2019 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |
WN19-CC-000230 - Windows Server 2019 AutoPlay must be disabled for all drives. | DISA Windows Server 2019 STIG v2r9 | Windows | CONFIGURATION MANAGEMENT |