Item Search

NameAudit NamePluginCategory
GOOG-15-009800 - Google Android 15 users must complete required training.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-009800 - Google Android 15 users must complete required training.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-009800 - Google Android 15 users must complete required training.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-009900 - Google Android 15 must be configured to disable Wi-Fi Sharing.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010100 - The Google Android 15 work profile must be configured to prevent users from adding personal email accounts to the work email app.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010500 - The Google Android 15 work profile must be configured to disable the autofill services.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010600 - Google Android 15 must be configured to disallow configuration of date and time.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010600 - Google Android 15 must be configured to disallow configuration of date and time.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010800 - Android 15 devices must have the latest available Google Android 15 operating system installed.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010800 - Android 15 devices must have the latest available Google Android 15 operating system installed.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010900 - Android 15 devices must be configured to disable the use of third-party keyboards.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010900 - Android 15 devices must be configured to disable the use of third-party keyboards.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010900 - Android 15 devices must be configured to disable the use of third-party keyboards.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

OL07-00-010291 - The Oracle Linux operating system must not have accounts configured with blank or null passwords.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

OL07-00-040711 - The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-215065 - RHEL 9 must not have the quagga package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-215080 - RHEL 9 must have the gnutls-utils package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-215085 - RHEL 9 must have the nss-tools package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-231010 - A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent).DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-231080 - RHEL 9 must prevent code from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232040 - RHEL 9 permissions of cron configuration files and directories must not be modified from the operating system defaults.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232065 - RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232090 - RHEL 9 /etc/group file must be owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232095 - RHEL 9 /etc/group file must be group-owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232130 - RHEL 9 /etc/passwd file must be owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232155 - RHEL 9 /etc/shadow file must be group-owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-232160 - RHEL 9 /etc/shadow- file must be owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-252035 - RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-253065 - RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-254030 - RHEL 9 must not accept router advertisements on all IPv6 interfaces by default.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-254035 - RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-255080 - RHEL 9 must not allow a noncertificate trusted host SSH logon to the system.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-255085 - RHEL 9 must not allow users to override SSH environment variables.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-255105 - RHEL 9 SSH server configuration file must be group-owned by root.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-255120 - RHEL 9 SSH private host key files must have mode 0640 or less permissive.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-255130 - RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-271040 - RHEL 9 must not allow unattended or automatic logon via the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-271095 - RHEL 9 must disable the ability of a user to restart the system from the login screen.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-271105 - RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-271110 - RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-411025 - RHEL 9 must set the umask value to 077 for all local interactive user accounts.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-411095 - RHEL 9 must not have unauthorized accounts.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-412065 - RHEL 9 must define default permissions for all authenticated users in such a way that the user can only read and modify their own files.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-412075 - RHEL 9 must display the date and time of the last successful account logon upon logon.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-611025 - RHEL 9 must not allow blank or null passwords.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-652060 - RHEL 9 must use cron logging.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-12-030261 - The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display.DISA SLES 12 STIG v3r2Unix

CONFIGURATION MANAGEMENT

SLES-12-030364 - The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.DISA SLES 12 STIG v3r2Unix

CONFIGURATION MANAGEMENT

WN22-00-000290 - Windows Server 2022 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000420 - Windows Server 2022 FTP servers must be configured to prevent anonymous logons.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT