1.007 - Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.040 - Automatic logons must be disabled. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.052 - Ejection of removable NTFS media is not restricted to Administrators. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.071 - The system is configured to give anonymous users Everyone rights. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.072 - The system is not configured to use the Classic security model. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.075 - The system is not configured to recommended LDAP client signing requirements. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.078 - The system must be configured to require case insensitivity for non-Windows subsystems. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.131 - User Account Control - Behavior of elevation prompt for standard users. | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.135 - User Account Control - Switch to secure desktop | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO216 - Outlook - Publishing calendars to Office Online must be prevented. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO223 - Outlook - Trust EMail from senders in receiver's contact list must be enforced. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO225 - Outlook - Outlook Dial-up options to Warn user before allowing switch in dial-up access must be configured. | DISA STIG Office 2010 Outlook v1r14 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO228 - Outlook - Plain Text Options for outbound email must be configured - PlainWrapLen | DISA STIG Office 2010 Outlook v1r14 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO257 - Outlook - S/Mime interoperability with external clients for message handling must be configured. | DISA STIG Office 2010 Outlook v1r14 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO260 - Outlook - Message formats must be set to use SMime. | DISA STIG Office 2010 Outlook v1r14 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO262 - Outlook - Run in FIPS compliant mode must be enforced. | DISA STIG Office 2010 Outlook v1r14 | Windows | IDENTIFICATION AND AUTHENTICATION |
DTOO269 - Outlook - Attachments using generated name for secure temporary folders must be configured. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO271 - Outlook - Automatic download content for email in Safe Senders list must be disallowed. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO277 - Outlook - Hyperlinks in suspected phishing e-mail messages must be disallowed. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO344 - Outlook - Outlook Rich Text options must be set for converting to plain text format. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
GEN003790 - The services file must not have an extended ACL. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN003865 - Network analysis tools must not be installed - 'ethereal' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN004500 - The SMTP service log file must have mode 0644 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN004580 - The system must not use .forward files. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN004800 - Unencrypted FTP must not be used on the system - 'ftp is disabled' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN004940 - The ftpusers file must have mode 0640 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005201 - X11 forwarding for SSH must be disabled. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005202 - The sshd server must bind the X11 forwarding server to the loopback address. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005202 - The sshd server must bind the X11 forwarding server to the loopback address. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005365 - The snmpd.conf file must be group-owned by bin, sys, or system - '/etc/snmpdv3.conf' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005390 - The /etc/syslog.conf file must have mode 0640 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005400 - The /etc/syslog.conf file must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005420 - The /etc/syslog.conf file must be group-owned by bin, sys, or system. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005511 - The SSH client must be configured to not use CBC-based ciphers. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005540 - The SSH daemon must be configured for IP filtering - '/etc/hosts.deny' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005590 - The system must not be running any routing protocol daemons, unless the system is a router. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005600 - IP forwarding for IPv4 must not be enabled, unless the system is a router. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005840 - The NFS server must be configured to restrict file system access to local hosts - 'All exports contain ro or rw' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005900 - The nosuid option must be enabled on all NFS client mounts. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006150 - The /usr/lib/smb.conf file must not have an extended ACL. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006180 - The /var/private/smbpasswd file must be group-owned by sys or system. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006220 - The smb.conf file must use the hosts option to restrict access to Samba. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006230 - Samba must be configured to use encrypted passwords. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006300 - The /etc/news/nnrp.access (or equivalent) must have mode 0600 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006360 - The files in /etc/news must be group-owned by system or news. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN007700 - The IPv6 protocol handler must not be bound to the network stack unless needed. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN007780 - The system must not have 6to4 enabled. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN007920 - The system must not forward IPv6 source-routed packets. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN008060 - If the system is using LDAP the /etc/ldap.conf file must have mode 0644 or less permissive | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN008140 - The TLS certificate authority file and/or directory (as appropriate) must be owned by root | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |