AIOS-17-010600 - Apple iOS/iPadOS 17 must implement the management setting: not allow automatic completion of Safari browser passcodes. | MobileIron - DISA Apple iOS/iPadOS 17 v2r1 | MDM | CONFIGURATION MANAGEMENT |
DTBC-0068 - Chrome development tools must be disabled. | DISA STIG Google Chrome v2r9 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTBI1135-IE11 - Internet Explorer Development Tools Must Be Disabled. | DISA STIG IE 11 v2r5 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTOO120 - Open/Save actions for web pages and Excel 2003 XML spreadsheets must be blocked. | DISA STIG Microsoft Excel 2013 v1r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-67-000030 - The ESXi host must produce audit records containing information to establish what type of events occurred. | DISA STIG VMware vSphere 6.7 ESXi v1r3 | VMware | AUDIT AND ACCOUNTABILITY |
GEN000000-LNX00800 - The system must use a Linux Security Module configured to limit the privileges of system services - 'SELINUX = enforcing' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN000000-LNX00800 - Use a Linux Security Module configured to limit privileges of system services - 'SELINUXTYPE = targeted or strict' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=role | DISA STIG Solaris 10 SPARC v2r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/sfw/man/* | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/sfw/share/man/* | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/share/man/* | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002260 - The system must be checked for extraneous device files at least weekly. | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002750 - The audit system must be configured to audit account creation - 'groupadd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - 'gshadow' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - 'passwd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - flags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - flags ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - naflags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002750 - The audit system must be configured to audit account creation - naflags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002751 - The audit system must be configured to audit account modification - flags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002751 - The audit system must be configured to audit account modification - naflags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002751 - The audit system must be configured to audit account modification - naflags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - flags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - flags ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - flags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - naflags +ua and -ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling - naflags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002752 - The audit system must be configured to audit account disabling. | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - 'groupdel' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - 'userdel' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - flags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - naflags +ua and -ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - naflags +ua and -ua | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002753 - The audit system must be configured to audit account termination - naflags ua | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002870 - The system must be configured to send audit records to a remote audit server - NFS | DISA STIG Solaris 10 SPARC v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002870 - The system must be configured to send audit records to a remote audit server - SYSLOG | DISA STIG Solaris 10 SPARC v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002870 - The system must be configured to send audit records to a remote audit server - SYSLOG | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN003220 - Cron programs must not set the umask to a value less restrictive than 077. | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN003220 - Cron programs must not set the umask to a value less restrictive than 077. | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - used | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - used | DISA STIG Solaris 10 SPARC v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN008820 - The system package management tool must not automatically obtain updates - /var/spool/cron/atjobs/* | DISA STIG Solaris 10 SPARC v2r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN008820 - The system package management tool must not automatically obtain updates - /var/spool/cron/crontabs/* | DISA STIG Solaris 10 X86 v2r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN008820 - The system package management tool must not automatically obtain updates. | DISA STIG for Oracle Linux 5 v2r1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
OL08-00-010390 - OL 8 must have the package required for multifactor authentication installed. | DISA Oracle Linux 8 STIG v2r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-09-212050 - RHEL 9 must enable mitigations against processor-based vulnerabilities. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
RHEL-09-252025 - RHEL 9 must disable the chrony daemon from acting as a server. | DISA Red Hat Enterprise Linux 9 STIG v2r4 | Unix | CONFIGURATION MANAGEMENT |
UBTU-22-411045 - Ubuntu 22.04 LTS must automatically lock an account until the locked account is released by an administrator when three unsuccessful logon attempts have been made. | DISA Canonical Ubuntu 22.04 LTS STIG v2r4 | Unix | ACCESS CONTROL |
WN22-DC-000160 - Windows Server 2022 directory service must be configured to terminate LDAP-based network connections to the directory server after five minutes of inactivity. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
WNFWA-000010 - Windows Defender Firewall with Advanced Security must log dropped packets when connected to a domain. | DISA Microsoft Windows Firewall v2r2 | Windows | AUDIT AND ACCOUNTABILITY |