Item Search

NameAudit NamePluginCategory
1.007 - Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.040 - Automatic logons must be disabled.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.052 - Ejection of removable NTFS media is not restricted to Administrators.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.071 - The system is configured to give anonymous users Everyone rights.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.072 - The system is not configured to use the Classic security model.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.075 - The system is not configured to recommended LDAP client signing requirements.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.078 - The system must be configured to require case insensitivity for non-Windows subsystems.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.131 - User Account Control - Behavior of elevation prompt for standard users.DISA Windows Vista STIG v6r41Windows

IDENTIFICATION AND AUTHENTICATION

3.135 - User Account Control - Switch to secure desktopDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO216 - Outlook - Publishing calendars to Office Online must be prevented.DISA STIG Office 2010 Outlook v1r14Windows

CONFIGURATION MANAGEMENT

DTOO223 - Outlook - Trust EMail from senders in receiver's contact list must be enforced.DISA STIG Office 2010 Outlook v1r14Windows

CONFIGURATION MANAGEMENT

DTOO225 - Outlook - Outlook Dial-up options to Warn user before allowing switch in dial-up access must be configured.DISA STIG Office 2010 Outlook v1r14Windows

IDENTIFICATION AND AUTHENTICATION

DTOO228 - Outlook - Plain Text Options for outbound email must be configured - PlainWrapLenDISA STIG Office 2010 Outlook v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO257 - Outlook - S/Mime interoperability with external clients for message handling must be configured.DISA STIG Office 2010 Outlook v1r14Windows

IDENTIFICATION AND AUTHENTICATION

DTOO260 - Outlook - Message formats must be set to use SMime.DISA STIG Office 2010 Outlook v1r14Windows

IDENTIFICATION AND AUTHENTICATION

DTOO262 - Outlook - Run in FIPS compliant mode must be enforced.DISA STIG Office 2010 Outlook v1r14Windows

IDENTIFICATION AND AUTHENTICATION

DTOO269 - Outlook - Attachments using generated name for secure temporary folders must be configured.DISA STIG Office 2010 Outlook v1r14Windows

CONFIGURATION MANAGEMENT

DTOO271 - Outlook - Automatic download content for email in Safe Senders list must be disallowed.DISA STIG Office 2010 Outlook v1r14Windows

CONFIGURATION MANAGEMENT

DTOO277 - Outlook - Hyperlinks in suspected phishing e-mail messages must be disallowed.DISA STIG Office 2010 Outlook v1r14Windows

CONFIGURATION MANAGEMENT

DTOO344 - Outlook - Outlook Rich Text options must be set for converting to plain text format.DISA STIG Office 2010 Outlook v1r14Windows

CONFIGURATION MANAGEMENT

GEN003790 - The services file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003865 - Network analysis tools must not be installed - 'ethereal'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN004500 - The SMTP service log file must have mode 0644 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN004580 - The system must not use .forward files.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN004800 - Unencrypted FTP must not be used on the system - 'ftp is disabled'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN004940 - The ftpusers file must have mode 0640 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005201 - X11 forwarding for SSH must be disabled.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN005202 - The sshd server must bind the X11 forwarding server to the loopback address.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005202 - The sshd server must bind the X11 forwarding server to the loopback address.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN005365 - The snmpd.conf file must be group-owned by bin, sys, or system - '/etc/snmpdv3.conf'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005390 - The /etc/syslog.conf file must have mode 0640 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005400 - The /etc/syslog.conf file must be owned by root.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005420 - The /etc/syslog.conf file must be group-owned by bin, sys, or system.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005511 - The SSH client must be configured to not use CBC-based ciphers.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005540 - The SSH daemon must be configured for IP filtering - '/etc/hosts.deny'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005590 - The system must not be running any routing protocol daemons, unless the system is a router.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005600 - IP forwarding for IPv4 must not be enabled, unless the system is a router.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005840 - The NFS server must be configured to restrict file system access to local hosts - 'All exports contain ro or rw'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005900 - The nosuid option must be enabled on all NFS client mounts.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006150 - The /usr/lib/smb.conf file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006180 - The /var/private/smbpasswd file must be group-owned by sys or system.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006220 - The smb.conf file must use the hosts option to restrict access to Samba.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006230 - Samba must be configured to use encrypted passwords.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006300 - The /etc/news/nnrp.access (or equivalent) must have mode 0600 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006360 - The files in /etc/news must be group-owned by system or news.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007700 - The IPv6 protocol handler must not be bound to the network stack unless needed.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007780 - The system must not have 6to4 enabled.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007920 - The system must not forward IPv6 source-routed packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN008060 - If the system is using LDAP the /etc/ldap.conf file must have mode 0644 or less permissiveDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN008140 - The TLS certificate authority file and/or directory (as appropriate) must be owned by rootDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL