| 1.168 UBTU-24-900600 | CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT II | Unix | AUDIT AND ACCOUNTABILITY |
| DTOO117 - Publisher - Saved from URL mark to assure Internet zone processing must be enforced. | DISA STIG Office 2010 Publisher v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO117 - Saved from URL mark to assure Internet zone processing must be enforced | DISA STIG Microsoft Publisher 2016 v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO119 - Word - Configuration for file validation must be enforced. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO123 - Publisher - Navigation to URL's embedded in Office products must be blocked. | DISA STIG Office 2010 Publisher v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO123 - Word - Navigation to URL's embedded in Office products must be blocked. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO124 - Word - Scripted Window Security must be enforced. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO126 - Add-on Management functionality must be allowed | DISA STIG Microsoft Publisher 2016 v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO126 - Add-on Management functionality must be allowed. | DISA STIG Microsoft Sharepoint Designer 2013 v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO127 - Add-ins to Office applications must be signed by a Trusted Publisher | DISA STIG Microsoft Publisher 2016 v1r3 | Windows | CONFIGURATION MANAGEMENT |
| DTOO128 - Publisher - Data Execution Prevention must be enforced. | DISA STIG Office 2010 Publisher v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO129 - Publisher - Links that invoke instances of IE from within an Office product must be blocked. | DISA STIG Office 2010 Publisher v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO131 - Publisher - Trust Bar Notifications for unsigned application add-ins must be blocked. | DISA STIG Office 2010 Publisher v1r12 | Windows | CONFIGURATION MANAGEMENT |
| DTOO132 - Word - File Downloads must be configured for proper restrictions. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO209 - Protection from zone elevation must be enforced | DISA STIG Microsoft Publisher 2016 v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO210 - Word - Pre-release versions of file formats new to Office Products must be blocked. | DISA STIG Office 2010 Word v1r12 | Windows | CONFIGURATION MANAGEMENT |
| DTOO211 - ActiveX installs must be configured for proper restrictions. | DISA STIG Microsoft Sharepoint Designer 2013 v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO288 - Word - Files in unsafe locations must be opened in Protected View. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO292 - Word - Document behavior if file validation fails must be set - DisableEditFromPV | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO292 - Word - Document behavior if file validation fails must be set - OpenInProtectedView | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO322 - Fatally corrupt files must be blocked from opening | DISA STIG Microsoft Publisher 2016 v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO336 - Word - Word 6.0 binary documents and templates must be configured for block open/save actions. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| DTOO338 - Word - Word 97 binary documents and templates must be configured to edit in protected view. | DISA STIG Office 2010 Word v1r12 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| GEN000000-AIX00040 - The securetcpip command must be used | DISA AIX 5.3 STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| GEN000253 - The time synchronization configuration file (such as /etc/ntp.conf) must not have an extended ACL. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN000360 - Group Identifiers (GIDs) reserved for system accounts must not be assigned to non-system groups. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN000680 - The system must require passwords to contain no more than three consecutive repeating characters. | DISA AIX 5.3 STIG v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
| GEN001210 - All system command files must not have extended ACLs - '/sbin/*' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN001270 - System log files must not have extended ACLs, except as needed to support authorized software. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN001394 - The /etc/group file must not have an extended ACL. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN001430 - The /etc/security/passwd file must not have an extended ACL. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN001730 - All global initialization files must not have extended ACLs - '/etc/environment' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN001901 - Local initialization files' library search paths must contain only absolute paths - 'LIBPATH' | DISA AIX 5.3 STIG v1r2 | Unix | CONFIGURATION MANAGEMENT |
| GEN002230 - All shell files must not have extended ACLs. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN002560 - The system and user default umask must be 077 - user initialization files | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003060 - Default system accounts must be included in the cron.allow file - 'bin' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003060 - Default system accounts must be included in the cron.allow file - 'lp' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003060 - Default system accounts must be included in the cron.allow file - 'lpd' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003060 - Default system accounts must be included in the cron.deny file - 'bin' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003060 - Default system accounts must GEN003580be included in the cron.deny file - 'sshd' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003110 - Cron and crontab directories must not have extended ACLs - '/var/spool/cron/crontabs/*' | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003210 - The cron.deny file must not have an extended ACL. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'daemon' - at.deny | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'lp' - at.deny | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nobody' - at.allow | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'sshd' - at.deny | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'sys' - at.allow | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.allow | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.deny | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |
| GEN003580 - The system must use initial TCP sequence numbers most resistant to sequence number guessing attacks. | DISA AIX 5.3 STIG v1r2 | Unix | ACCESS CONTROL |