Item Search

NameAudit NamePluginCategory
1.36 WN10-00-000170CIS Microsoft Windows 10 STIG v1.0.0 CAT IIWindows

CONFIGURATION MANAGEMENT

1.39 WN16-00-000411CIS Microsoft Windows Server 2016 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.39 WN22-00-000390CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.40 WN19-00-000400CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows

CONFIGURATION MANAGEMENT

1.40 WN22-00-000400CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT IIWindows

CONFIGURATION MANAGEMENT

1.249 WN10-UR-000085CIS Microsoft Windows 10 STIG v1.0.0 CAT IIWindows

ACCESS CONTROL

2.11.8.7.2.1.9 Ensure 'Word XP binary documents and templates' is set to 'Enabled: Open/Save blocked, use open policy'CIS Microsoft Office Enterprise v1.2.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in default)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if java.util.logging.ConsoleHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in default)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler exists in web application)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in default)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties (check if org.apache.juli.FileHandler logging is enabled in web application)CIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.6.11.3 (L1) Ensure 'Prohibit use of Internet Connection Sharing on your DNS domain network' is set to 'Enabled'CIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

CISC-ND-001260 - The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA Cisco NX OS Switch NDM STIG v3r4Cisco

AUDIT AND ACCOUNTABILITY

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - The Internet Explorer Bind to Object functionality must be enabled.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Scripted Window Security must be enforced.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Scripted Window Security must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of Internet Explorer from within an Office product must be blocked.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO211 - ActiveX Installs must be configured for proper restriction.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO999-OneNote13 - The version of OneNote running on the system must be a supported version.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND INFORMATION INTEGRITY

FGFW-ND-000020 - The FortiGate device must automatically audit account removal actionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000035 - The FortiGate device must allow full access to only those individuals or roles designated by the ISSM.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000040 - The FortiGate device must audit the execution of privileged functionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000060 - The FortiGate device must log all user activity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000070 - The FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000105 - The FortiGate device must allocate audit record storage capacity in accordance with organization-defined audit record storage requirementsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000120 - The FortiGate device must synchronize internal information system clocks using redundant authoritative time sourcesDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FGFW-ND-000155 - The FortiGate device must limit privileges to change the software resident within software libraries.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000165 - The FortiGate device must use LDAP for authentication.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000175 - The FortiGate device must generate log records for a locally developed list of auditable eventsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FGFW-ND-000180 - The FortiGate device must conduct backups of system-level information contained in the information system when changes occur.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

FGFW-ND-000200 - The FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accountsDISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000220 - The FortiGate device must enforce a minimum 15-character password length.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000225 - The FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000285 - The FortiGate device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

Network access: Remotely accessible registry pathsMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry pathsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

WN10-CC-000039 - Run as different user must be removed from context menus.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN11-00-000150 - Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.DISA Microsoft Windows 11 STIG v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WN12-SO-000044 - The system must be configured to disable the Internet Router Discovery Protocol (IRDP).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION