Item Search

NameAudit NamePluginCategory
AIOS-17-010500 - Apple iOS/iPadOS 17 must implement the management setting: limit Ad Tracking.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-010500 - Apple iOS/iPadOS 17 must implement the management setting: limit Ad Tracking.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-17-010800 - Apple iOS/iPadOS 17 must implement the management setting: not allow use of Handoff.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-010800 - Apple iOS/iPadOS 17 must implement the management setting: not allow use of Handoff.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-010850 - Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AMLS-NM-000180 - The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000190 - The Arista Multilayer Switch must produce audit log records containing sufficient information to establish what type of event occurred.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

BIND-9X-001031 - The print-time variable for the configuration of BIND 9.x server logs must be configured to establish when (date and time) the events occurred.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

BIND-9X-001032 - The print-category variable for the configuration of BIND 9.x server logs must be configured to record information indicating which process generated the events.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-001000 - The Docker Enterprise Per User Limit Login Session Control in the Universal Control Plane (UCP) Admin Settings must be set to an organization-defined value for all accounts and/or account types.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

ACCESS CONTROL

GEN000000-LNX00720 - Auditing must be enabled at boot by setting a kernel parameter.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=rootDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN002753 - The audit system must be configured to audit account termination - flags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002753 - The audit system must be configured to audit account termination - naflags uaDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN002870 - The system must be configured to send audit records to a remote audit server - NFSDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - configDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN008800 - The system package management tool must cryptographically verify the authenticity of software packages during installation.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN008820 - The system package management tool must not automatically obtain updates - /var/spool/cron/atjobs/*DISA STIG Solaris 10 X86 v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GEN008820 - The system package management tool must not automatically obtain updates - /var/spool/cron/crontabs/*DISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GOOG-09-003400 - The Google Android Pie must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.AirWatch - DISA Google Android 9.x v2r1MDM

ACCESS CONTROL

OL6-00-000004 - The system must use a separate file system for the system audit data path.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000025 - All device files must be monitored by the system Linux Security Module.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000171 - The audit system must be configured to audit all attempts to alter system time through clock_settime - b32DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000182 - The audit system must be configured to audit modifications to the systems network configuration - '/etc/issue.net'DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000183 - The audit system must be configured to audit modifications to the systems Mandatory Access Control (MAC) configuration (SELinux) - SELinuxDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000184 - The audit system must be configured to audit all discretionary access control permission modifications using chmod, fchmod, and fchmodat - b64 auid=0DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000185 - The audit system must be configured to audit all discretionary access control permission modifications using chown, fchown, fchownat, and lchown - b32 auid=0DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000190 - The audit system must be configured to audit all discretionary access control permission modifications using setxattr, lsetxattr, fsetxattr, removexattr, lremovexattr, and fremovexattr - b32 auid=0DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000197 - The audit system must be configured to audit failed attempts to access files and programs - b64 EACCES auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000199 - The audit system must be configured to audit successful file system mounts - b64 auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000200 - The audit system must be configured to audit user deletions of files and programs - b64 auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000268 - The rdisc service must not be running - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000273 - The system must use SMB client signing for connecting to samba servers using mount.cifs.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000276 - The operating system must protect the confidentiality and integrity of data at rest.DISA STIG Oracle Linux 6 v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000294 - All GIDs referenced in /etc/passwd must be defined in /etc/group.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000299 - The system must require passwords to contain no more than three consecutive repeating characters - password-authDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000319 - The system must limit users to 10 simultaneous system logins, or a site-defined number, in accordance with operational requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000339 - The FTP daemon must be configured for logging or verbose mode - 'xferlog_enable'DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000342 - The system default umask for the bash shell must be 077.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000525 - Auditing must be enabled at boot by setting a kernel parameter.DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010340 - The audit system must be configured to audit failed attempts to access files and programs.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-010350 - The operating system must protect against an individual falsely denying having performed a particular action. In order to do so the system must be configured to send audit records to a remote audit server.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010360 - The auditing system must not define a different auditing level for specific users.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SQL4-00-039100 - The SQL Server Browser service must be disabled if its use is not necessary..DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

UBTU-16-010930 - The Ubuntu operating system must use a separate file system for the system audit data path.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

UBTU-24-200610 - Ubuntu 24.04 LTS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-001480 - The WebSphere Application servers with an RMF categorization of high must be in a high-availability (HA) cluster.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WNFWA-000017 - Windows Defender Firewall with Advanced Security log size must be configured for private network connections.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY