Item Search

NameAudit NamePluginCategory
1.100 WN19-CC-000060CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIIWindows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.2 Ensure Screen Saver Corners Are Secure - top right cornerCIS Apple macOS 10.14 v2.0.0 L2Unix

ACCESS CONTROL

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaws.exeCIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - MSACCESS.exeCIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OUTLOOK.exeCIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VPREVIEW.EXECIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - WINWORD.EXECIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - wordpad.exeCIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

AIOS-18-015500 - Apple iOS/iPadOS 18 must disable the download of iOS/iPadOS beta updates.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

APPL-15-000002 - The macOS system must enforce screen saver password.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

ACCESS CONTROL

APPL-15-000012 - The macOS system must automatically remove or disable temporary or emergency user accounts within 72 hours.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

ACCESS CONTROL

APPL-15-000051 - The macOS system must configure SSHD ClientAliveInterval to 900.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000060 - The macOS system must set account lockout time to 15 minutes.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

ACCESS CONTROL

APPL-15-000170 - The macOS system must be configured to use an authorized time server.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

AUDIT AND ACCOUNTABILITY

APPL-15-000190 - The macOS system must configure sudo to log events.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

AUDIT AND ACCOUNTABILITY

APPL-15-001001 - The macOS system must be configured to audit all administrative action events.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MAINTENANCE

APPL-15-001003 - The macOS system must enable security auditing.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

APPL-15-001017 - The macOS system must configure audit log folders to mode 700 or less permissive.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

AUDIT AND ACCOUNTABILITY

APPL-15-001150 - The macOS system must disable password authentication for SSH.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

ESXI-70-000005 - The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

ACCESS CONTROL

ESXI-70-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-70-000042 - The ESXi host must terminate shell services after 10 minutes.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000043 - The ESXi host must log out of the console UI after two minutes.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000050 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000057 - The ESXi host must configure the firewall to block network traffic by default - outgoingDISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000061 - All port groups on standard switches must be configured to reject guest promiscuous mode requests.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000062 - Use of the dvFilter network application programming interfaces (APIs) must be restricted.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000091 - The ESXi host must be configured with an appropriate maximum password age.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000097 - The ESXi Common Information Model (CIM) service must be disabled.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000003 - The vCenter Server must enforce a 60-day maximum password lifetime restriction.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCTR-67-000004 - The vCenter Server must terminate management sessions after 10 minutes of inactivity.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000008 - The vCenter Server must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

AUDIT AND ACCOUNTABILITY

VCTR-67-000009 - The vCenter Server must implement Active Directory authentication.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCTR-67-000014 - The vCenter Server must set the distributed port group MAC Address Change policy to reject.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000019 - The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000020 - The vCenter Server must not configure all port groups to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000025 - The vCenter Server must disable the managed object browser (MOB) at all times when not required for troubleshooting or maintenance of managed objects.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000036 - The vCenter Server must produce audit records containing information to establish what type of events occurred.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND INFORMATION INTEGRITY

VCTR-67-000041 - The vCenter Server passwords must contain at least one lowercase character.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCTR-67-000046 - The vCenter Server must set the interval for counting failed login attempts to at least 15 minutes.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

ACCESS CONTROL

VCTR-67-000047 - The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

ACCESS CONTROL

VCTR-67-000052 - The vCenter Server must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000055 - The vCenter Server must configure the vSAN Datastore name to a unique name.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000059 - The vCenter Server must enable certificate based authentication.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000070 - The vCenter Server must not automatically refresh client sessions.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000071 - The vCenter Server must terminate management sessions after 10 minutes of inactivity.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000072 - The vCenter Server services must be ran using a service account instead of a built-in Windows account.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000075 - The vCenter Server must enable all tasks to be shown to Administrators in the Web Client.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

WN11-CC-000025 - The system must be configured to prevent IP source routing.DISA Microsoft Windows 11 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN11-CC-000035 - The system must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Microsoft Windows 11 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION