AIOS-17-010600 - Apple iOS/iPadOS 17 must implement the management setting: not allow automatic completion of Safari browser passcodes. | AirWatch - DISA Apple iOS/iPadOS 17 v2r1 | MDM | CONFIGURATION MANAGEMENT |
GEN000000-LNX00800 - Use a Linux Security Module configured to limit the privileges of system services - 'SELINUX = enforcing' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=root | DISA STIG Solaris 10 SPARC v2r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=role | DISA STIG Solaris 10 X86 v2r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN001080 - The root shell must be located in the / file system. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN001080 - The root shell must be located in the / file system. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/sfw/share/man/* | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/share/man/* | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/csh.logout' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/profile.d/*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/suid_profile' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - /etc/csh.cshrc | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002500 - The sticky bit must be set on all public directories. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN002715 - System audit tool executables must be owned by root - '/sbin/audispd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002715 - System audit tool executables must be owned by root - '/sbin/auditctl' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002715 - System audit tool executables must be owned by root - '/sbin/aureport' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/auditctl' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/auditd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002716 - System audit tool executables must be group-owned by root, bin, sys, or system - '/sbin/autrace' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/aureport' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/ausearch' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002718 - System audit tool executables must not have extended ACLs. | DISA STIG Solaris 10 SPARC v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002750 - The audit system must be configured to audit account creation - 'group' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - 'shadow' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - 'useradd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - flags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002751 - The audit system must be configured to audit account modification - 'passwd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002751 - The audit system must be configured to audit account modification - flags +ua and -ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002751 - The audit system must be configured to audit account modification - flags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - flags +ua and -ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - naflags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - flags ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN003500 - Process core dumps must be disabled unless needed - COREADM | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003500 - Process core dumps must be disabled unless needed. | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
GEN003502 - The centralized process core dump data directory must be owned by root. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003503 - The centralized process core dump data directory must be group-owned by root, bin, or sys. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003505 - The centralized process core dump data directory must not have an extended ACL. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003602 - The system must not process ICMP timestamp requests - dladm show-link | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003623 - The system must use a separate file system for the system audit data path - /etc/vfstab | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003623 - The system must use a separate file system for the system audit data path - df -h AUDIT_DIR | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN004440 - Sendmail logging must not be set to less than nine in the sendmail.cf file. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN004700 - The Sendmail service must not have the wizard backdoor active. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005524 - The SSH daemon must not permit GSSAPI authentication unless needed. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005760 - The NFS export configuration file must have mode 0644 or less permissive. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN008440 - Automated file system mounting tools must not be enabled unless needed. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN008460 - The system must have USB disabled unless needed. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
RHEL-09-252030 - RHEL 9 must disable network management of the chrony daemon. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-20-010072 - The Ubuntu operating system must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made. | DISA Canonical Ubuntu 20.04 LTS STIG v2r2 | Unix | ACCESS CONTROL |
WNFWA-000009 - Windows Defender Firewall with Advanced Security log size must be configured for domain connections. | DISA Microsoft Windows Firewall v2r2 | Windows | AUDIT AND ACCOUNTABILITY |