Item Search

NameAudit NamePluginCategory
AIOS-17-014800 - Apple iOS/iPadOS 17 must be configured to disable 'Auto Unlock' of the iPhone by an Apple Watch - Auto Unlock of the iPhone by an Apple Watch.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AIOS-18-014800 - Apple iOS/iPadOS 18 must be configured to disable 'Auto Unlock' of the iPhone by an Apple Watch - Auto Unlock of the iPhone by an Apple Watch.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

EP11-00-007400 - The EDB Postgres Advanced Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.EDB PostgreSQL Advanced Server v11 DB Audit v2r4PostgreSQLDB

ACCESS CONTROL

IISW-SV-000144 - IIS 8.5 web server system files must conform to minimum file permission requirements.DISA IIS 8.5 Server v2r7Windows

ACCESS CONTROL

MD4X-00-001200 - MongoDB must enforce discretionary access control policies, as defined by the data owner, over defined subjects and objects.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB

ACCESS CONTROL

MSFT-11-002000 - Microsoft Android 11 must be configured to enable encryption for data at rest on removable storage media or alternately, the use of removable storage media must be disabled.MobileIron - DISA Microsoft Android 11 COBO v1r2MDM

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-020022 - The Oracle Linux operating system must not allow privileged accounts to utilize SSH.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

OL07-00-020023 - The Oracle Linux operating system must elevate the SELinux context when an administrator calls the sudo command.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

PGS9-00-011700 - PostgreSQL must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

ACCESS CONTROL

PPS9-00-007400 - The EDB Postgres Advanced Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

ACCESS CONTROL

SOL-11.1-090120 - The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL

SP13-00-000140 - SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.DISA STIG SharePoint 2013 v2r4Windows

ACCESS CONTROL

TCAT-AS-001060 - Tomcat user account must be a non-privileged user.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

ACCESS CONTROL

WN10-RG-000005 - Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000035 - The Change the system time user right must only be assigned to Administrators and Local Service and NT SERVICE\autotimesvc.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000160 - The Restore files and directories user right must only be assigned to the Administrators group.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN12-AD-000001-DC - Active Directory data files must have proper access control permissions.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-AD-000002-DC - The Active Directory SYSVOL directory must have the proper access control permissions.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-AD-000005-DC - Domain created Active Directory Organizational Unit (OU) objects must have proper access control permissions.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-GE-000004-DC - Only administrators responsible for the domain controller must have Administrator rights on the system.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-GE-000004-MS - Only administrators responsible for the member server must have Administrator rights on the system.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key - compatabilityDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key - compatabilityDISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000007 - The Back up files and directories user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000015 - The Create symbolic links user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000015 - The Create symbolic links user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000016 - The Debug programs user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000022-DC - Unauthorized accounts must not have the Enable computer and user accounts to be trusted for delegation user right on domain controllers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000023 - The Force shutdown from a remote system user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000025 - The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000027 - The Increase scheduling priority user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000028 - The Load and unload device drivers user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000028 - The Load and unload device drivers user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000036 - The Profile single process user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000044-DC - Unauthorized accounts must not have the Add workstations to domain user right.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN16-UR-000010 - The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000090 - The Create a token object user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000130 - The Debug programs user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000230 - The Increase scheduling priority user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN19-DC-000090 - Windows Server 2019 Active Directory Group Policy objects must have proper access control permissions.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000010 - Windows Server 2019 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000040 - Windows Server 2019 Back up files and directories user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000080 - Windows Server 2019 Create permanent shared objects user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000090 - Windows Server 2019 Create symbolic links user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000150 - Windows Server 2019 Load and unload device drivers user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000180 - Windows Server 2019 Modify firmware environment values user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000220 - Windows Server 2019 Take ownership of files or other objects user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN22-DC-000070 - Windows Server 2022 permissions on the Active Directory data files must only allow System and Administrators access.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

WN22-UR-000160 - Windows Server 2022 lock pages in memory user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY