Item Search

NameAudit NamePluginCategory
AIOS-17-010600 - Apple iOS/iPadOS 17 must implement the management setting: not allow automatic completion of Safari browser passcodes.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

DTOO136 - The Save commands default file format must be configured.DISA STIG Microsoft Access 2013 v1r7Windows

CONFIGURATION MANAGEMENT

GEN000452 - The system must display the date and time of the last successful account login upon login.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock - saverListDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=roleDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/share/man/*DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN001290 - All manual page files must not have extended ACLs.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN001490 - User's home directories must not have extended ACLs.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN001540 - All files and directories contained in interactive user's home directories must be owned by the home directory's owner.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/csh.cshrc'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/csh.login'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - '/etc/ksh.kshrc'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - /etc/.loginDISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN002500 - The sticky bit must be set on all public directories.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - /usr/sbin/auditdDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - /usr/sbin/bsmrecordDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - /usr/sbin/bsmrecordDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/auditconfigDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - /usr/sbin/auditconfigDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/auditd'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN002719 - The audit system must alert the SA in the event of an audit processing failure - '/etc/audit/auditd.conf disk_error_action'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN002750 - The audit system must be configured to audit account creation - naflags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002751 - The audit system must be configured to audit account modification - flags +ua and -uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002751 - The audit system must be configured to audit account modification - naflags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002752 - The audit system must be configured to audit account disabling - flags +ua and -uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002752 - The audit system must be configured to audit account disabling - naflags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002753 - The audit system must be configured to audit account termination - naflags +ua and -uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN003500 - Process core dumps must be disabled unless needed - sys:coredumpsizeDISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN003501 - The system must be configured to store any process core dumps in a specific, centralized directory.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN003503 - The centralized process core dump data directory must be group-owned by root, bin, or sys.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN003504 - The centralized process core dump data directory must have mode 0700 or less permissive.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN003624 - The system must use a separate filesystem for /tmp (or equivalent).DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN003650 - All local file systems must employ journaling or another mechanism ensuring file system consistency.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_success'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_type'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN004440 - Sendmail logging must not be set to less than nine in the sendmail.cf file.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN004660 - The SMTP service must not have the EXPN feature active.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN004680 - The SMTP service must not have the VRFY feature active.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN004980 - The FTP daemon must be configured for logging or verbose mode.DISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN005526 - The SSH daemon must not permit Kerberos authentication unless needed.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN006571 - The file integrity tool must be configured to verify extended attributes - usedDISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN008460 - The system must have USB disabled unless needed - '/proc/bus/usb'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN008820 - The system package management tool must not automatically obtain updates - /var/spool/cron/crontabs/*DISA STIG Solaris 10 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000004 - The system must use a separate file system for the system audit data path.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000025 - All device files must be monitored by the system Linux Security Module.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL08-00-010390 - OL 8 must have the package required for multifactor authentication installed.DISA Oracle Linux 8 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-252025 - RHEL 9 must disable the chrony daemon from acting as a server.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-22-411045 - Ubuntu 22.04 LTS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

ACCESS CONTROL