Item Search

NameAudit NamePluginCategory
1.168 UBTU-24-900600CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIUnix

AUDIT AND ACCOUNTABILITY

DTOO117 - Publisher - Saved from URL mark to assure Internet zone processing must be enforced.DISA STIG Office 2010 Publisher v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - Saved from URL mark to assure Internet zone processing must be enforcedDISA STIG Microsoft Publisher 2016 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO119 - Word - Configuration for file validation must be enforced.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Publisher - Navigation to URL's embedded in Office products must be blocked.DISA STIG Office 2010 Publisher v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Word - Navigation to URL's embedded in Office products must be blocked.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Word - Scripted Window Security must be enforced.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - Add-on Management functionality must be allowedDISA STIG Microsoft Publisher 2016 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - Add-on Management functionality must be allowed.DISA STIG Microsoft Sharepoint Designer 2013 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO127 - Add-ins to Office applications must be signed by a Trusted PublisherDISA STIG Microsoft Publisher 2016 v1r3Windows

CONFIGURATION MANAGEMENT

DTOO128 - Publisher - Data Execution Prevention must be enforced.DISA STIG Office 2010 Publisher v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Publisher - Links that invoke instances of IE from within an Office product must be blocked.DISA STIG Office 2010 Publisher v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO131 - Publisher - Trust Bar Notifications for unsigned application add-ins must be blocked.DISA STIG Office 2010 Publisher v1r12Windows

CONFIGURATION MANAGEMENT

DTOO132 - Word - File Downloads must be configured for proper restrictions.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO209 - Protection from zone elevation must be enforcedDISA STIG Microsoft Publisher 2016 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO210 - Word - Pre-release versions of file formats new to Office Products must be blocked.DISA STIG Office 2010 Word v1r12Windows

CONFIGURATION MANAGEMENT

DTOO211 - ActiveX installs must be configured for proper restrictions.DISA STIG Microsoft Sharepoint Designer 2013 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO288 - Word - Files in unsafe locations must be opened in Protected View.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO292 - Word - Document behavior if file validation fails must be set - DisableEditFromPVDISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO292 - Word - Document behavior if file validation fails must be set - OpenInProtectedViewDISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO322 - Fatally corrupt files must be blocked from openingDISA STIG Microsoft Publisher 2016 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO336 - Word - Word 6.0 binary documents and templates must be configured for block open/save actions.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO338 - Word - Word 97 binary documents and templates must be configured to edit in protected view.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000000-AIX00040 - The securetcpip command must be usedDISA AIX 5.3 STIG v1r2Unix

CONFIGURATION MANAGEMENT

GEN000253 - The time synchronization configuration file (such as /etc/ntp.conf) must not have an extended ACL.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN000360 - Group Identifiers (GIDs) reserved for system accounts must not be assigned to non-system groups.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN000680 - The system must require passwords to contain no more than three consecutive repeating characters.DISA AIX 5.3 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN001210 - All system command files must not have extended ACLs - '/sbin/*'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN001270 - System log files must not have extended ACLs, except as needed to support authorized software.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN001394 - The /etc/group file must not have an extended ACL.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN001430 - The /etc/security/passwd file must not have an extended ACL.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/environment'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN001901 - Local initialization files' library search paths must contain only absolute paths - 'LIBPATH'DISA AIX 5.3 STIG v1r2Unix

CONFIGURATION MANAGEMENT

GEN002230 - All shell files must not have extended ACLs.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN002560 - The system and user default umask must be 077 - user initialization filesDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.allow file - 'bin'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.allow file - 'lp'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.allow file - 'lpd'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must be included in the cron.deny file - 'bin'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003060 - Default system accounts must GEN003580be included in the cron.deny file - 'sshd'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003110 - Cron and crontab directories must not have extended ACLs - '/var/spool/cron/crontabs/*'DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003210 - The cron.deny file must not have an extended ACL.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'daemon' - at.denyDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'lp' - at.denyDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'nobody' - at.allowDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'sshd' - at.denyDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'sys' - at.allowDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.allowDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003320 - System accounts must not be listed in at.allow or must be included in at.deny - 'uucp' - at.denyDISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL

GEN003580 - The system must use initial TCP sequence numbers most resistant to sequence number guessing attacks.DISA AIX 5.3 STIG v1r2Unix

ACCESS CONTROL