Item Search

NameAudit NamePluginCategory
AMLS-NM-000180 - The Arista Multilayer Switch must generate audit records when successful/unsuccessful attempts to access privileges occur.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000190 - The Arista Multilayer Switch must produce audit log records containing sufficient information to establish what type of event occurred.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

BIND-9X-001031 - The print-time variable for the configuration of BIND 9.x server logs must be configured to establish when (date and time) the events occurred.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

BIND-9X-001032 - The print-category variable for the configuration of BIND 9.x server logs must be configured to record information indicating which process generated the events.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-001000 - The Docker Enterprise Per User Limit Login Session Control in the Universal Control Plane (UCP) Admin Settings must be set to an organization-defined value for all accounts and/or account types.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

ACCESS CONTROL

ESXI-65-000052 - The ESXi host must protect the confidentiality and integrity of transmitted information by utilizing different TCP/IP stacks where possible.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-09-003400 - The Google Android Pie must be configured to display the DoD advisory warning message at start-up or each time the user unlocks the device.AirWatch - DISA Google Android 9.x v2r1MDM

ACCESS CONTROL

OL6-00-000197 - The audit system must be configured to audit failed attempts to access files and programs - b64 EACCES auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000199 - The audit system must be configured to audit successful file system mounts - b64 auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000200 - The audit system must be configured to audit user deletions of files and programs - b64 auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000268 - The rdisc service must not be running - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000273 - The system must use SMB client signing for connecting to samba servers using mount.cifs.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000276 - The operating system must protect the confidentiality and integrity of data at rest.DISA STIG Oracle Linux 6 v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000294 - All GIDs referenced in /etc/passwd must be defined in /etc/group.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000299 - The system must require passwords to contain no more than three consecutive repeating characters - password-authDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000319 - The system must limit users to 10 simultaneous system logins, or a site-defined number, in accordance with operational requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000339 - The FTP daemon must be configured for logging or verbose mode - 'xferlog_enable'DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000342 - The system default umask for the bash shell must be 077.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000525 - Auditing must be enabled at boot by setting a kernel parameter.DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000004 - The system must use a separate file system for the system audit data path.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000166 - The audit system must be configured to audit all attempts to alter system time through adjtimex - 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010340 - The audit system must be configured to audit failed attempts to access files and programs.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-010350 - The operating system must protect against an individual falsely denying having performed a particular action. In order to do so the system must be configured to send audit records to a remote audit server.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010360 - The auditing system must not define a different auditing level for specific users.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020090 - The finger daemon package must not be installed.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040270 - The value mesg n must be configured as the default setting for all users.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040500 - The operating system must limit the number of concurrent sessions for each account to an organization-defined number of sessions.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL

SOL-11.1-050020 - The system must not respond to ICMP timestamp requests.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050100 - The system must disable TCP reverse IP source routing.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050120 - The system must set maximum number of incoming connections to 1024.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050370 - The system must prevent local applications from generating source-routed packets.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050380 - The operating system must display the DoD approved system use notification message or banner before granting access to the system for general system logons.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL

SOL-11.1-050380 - The operating system must display the DoD approved system use notification message or banner before granting access to the system for general system logons.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

SOL-11.1-050430 - The FTP service must display the DoD approved system use notification message or banner before granting access to the system.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

SOL-11.1-070080 - All user accounts must be configured to use a home directory that exists.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-090040 - The system must not have any unnecessary accounts.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-090240 - All manual editing of system-relevant files shall be done using the pfedit command, which logs changes made to the files.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-100050 - The audit system must maintain a central audit trail for all zones.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SQL4-00-039100 - The SQL Server Browser service must be disabled if its use is not necessary..DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

UBTU-16-010930 - The Ubuntu operating system must use a separate file system for the system audit data path.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

VCWN-65-000062 - The vCenter Server for Windows must enable Login banner for vSphere web client.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000066 - The vCenter Server for Windows must have new Key Encryption Keys (KEKs) re-issued at regular intervals for vSAN encrypted datastore(s).DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VMCH-65-000012 - The unexposed feature keyword isolation.tools.ghi.launchmenu.change must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000013 - The unexposed feature keyword isolation.tools.memSchedFakeSampleStats.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000018 - The unexposed feature keyword isolation.tools.ghi.trayicon.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000019 - The unexposed feature keyword isolation.tools.unity.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000025 - The unexposed feature keyword isolation.tools.vmxDnDVersionGet.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000029 - Unauthorized CD/DVD devices must be disconnected on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000042 - System administrators must use templates to deploy virtual machines whenever possible.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000048 - 3D features on the virtual machine must be disabled when not required.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT