Item Search

NameAudit NamePluginCategory
2.1 Disable Local-only Graphical Login EnvironmentCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.1.3 - AirWatch - Set the 'minimum password length'AirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

IDENTIFICATION AND AUTHENTICATION

4.3.6 Ensure sudo authentication timeout is configured correctlyCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.6 Ensure sudo authentication timeout is configured correctlyCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.3.2 Ensure that Content Security Policy (CSP) is enabled and configured properlyCIS NGINX v3.0.0 L2 WebserverUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.3.6 Ensure sudo authentication timeout is configured correctlyCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

ACCESS CONTROL

5.3.6 Ensure sudo authentication timeout is configured correctlyCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

ACCESS CONTROL

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

7.8 Extensible Firmware Interface (EFI) passwordCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
7.11 App Store Password SettingsCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
AIOS-02-090100 - Apple iOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-090100 - Apple iOS must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS 12 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-16-011000 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS-iPadOS 16 STIG v2r2MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2016 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2025 DC v2506 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2025 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2025 MS v2506 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server v20H2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

APPNET0075 - Update and configure the .NET Framework to support TLS.DISA Microsoft DotNet Framework 4.0 STIG v2r7Windows

CONFIGURATION MANAGEMENT

BIND-9X-001360 - The BIND 9.x server implementation must prohibit the forwarding of queries to servers controlled by organizations outside of the U.S. government.DISA BIND 9.x STIG v3r1Unix

CONFIGURATION MANAGEMENT

BIND-9X-001490 - On the BIND 9.x server, the platform on which the name server software is hosted must be configured to send outgoing DNS messages from a random port.DISA BIND 9.x STIG v3r1Unix

CONFIGURATION MANAGEMENT

CISC-RT-000260 - The Cisco perimeter switch must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.DISA Cisco IOS Switch RTR STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA Cisco IOS XR Router RTR STIG v3r3Cisco

ACCESS CONTROL

CISC-RT-000470 - The Cisco BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).DISA Cisco IOS Router RTR STIG v3r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000470 - The Cisco BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).DISA Cisco IOS XE Router RTR STIG v3r5Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000820 - The Cisco multicast Rendezvous Point (RP) router must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.DISA Cisco IOS Router RTR STIG v3r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DTAVSEL-106 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-106 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

Ensure 'HTTP session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

GEN000800 - The system must prohibit the reuse of passwords within five iterations.DISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000800 - The system must prohibit the reuse of passwords within five iterations.DISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000202 - The audit system must be configured to audit the loading and unloading of dynamic kernel modules - insmodDISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000202 - The audit system must be configured to audit the loading and unloading of dynamic kernel modules - modprobeDISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000202 - The audit system must be configured to audit the loading and unloading of dynamic kernel modules - module b32DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000202 - The audit system must be configured to audit the loading and unloading of dynamic kernel modules - delete_module 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SLEM-05-253045 - SLEM 5 must be configured to use TCP syncookies.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLEM-05-255090 - There must be no .shosts files on SLEM 5.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

CONFIGURATION MANAGEMENT

SLEM-05-255095 - There must be no shosts.equiv files on SLEM 5.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

CONFIGURATION MANAGEMENT

SLEM-05-653050 - SLEM 5 must protect audit rules from unauthorized modification.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

AUDIT AND ACCOUNTABILITY

SLES-12-010910 - The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.DISA SLES 12 STIG v3r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040220 - The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.DISA SUSE Linux Enterprise Server 15 STIG v2r6Unix

CONFIGURATION MANAGEMENT