Item Search

NameAudit NamePluginCategory
1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers accountCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

5 - AuthenticationTNS Best Practice Jetty 9 LinuxUnix
AOSX-14-000008 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-15-000008 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

APPL-11-000008 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

APPL-11-000008 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

ESXi : config-firewall-access - 'CIM SLP allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'Fault Tolerance blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'HBR allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'VMware vCenter Agent allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'WOL allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : disable-mobVMWare vSphere 5.X Hardening GuideVMware
GEN005200 - X displays must not be exported to the world.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN005220 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN005240 - The .Xauthority utility must only permit access to authorized hosts.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

MADB-10-012200 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to generate and validate cryptographic hashes.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

MADB-10-012300 - MariaDB must implement NIST FIPS 140-2 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the data owners requirements.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-012700 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-012800 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to generate and validate cryptographic hashes.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-012900 - The EDB Postgres Advanced Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to protect unclassified information requiring confidentiality and cryptographic protection, in accordance with the requirements of the data owner.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-020530 - X displays must not be exported to the world.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SOL-11.1-020530 - X displays must not be exported to the world.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SOL-11.1-020540 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020550 - The .Xauthority utility must only permit access to authorized hosts.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SOL-11.1-020550 - The .Xauthority utility must only permit access to authorized hosts.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

VM : disable-console-copyVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-console-dndVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-disk-shrinking-shrinkVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-disk-shrinking-wiperVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-autologonVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : disable-unexposed-features-memsfssVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-shellactionVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-toporequestVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unityVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-interlockVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-windowcontentsVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-versiongetVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-versionsetVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-vix-messagesVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disconnect-devices-floppyVMWare vSphere 5.X Hardening GuideVMware

MEDIA PROTECTION

VM : disconnect-devices-serialVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : limit-console-connections-oneVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : limit-console-connections-twoVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : limit-log-sizeVMWare vSphere 5.X Hardening GuideVMware

AUDIT AND ACCOUNTABILITY

VM : prevent-device-interaction-connectVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : prevent-device-interaction-editVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : restrict-host-infoVMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

VM : use-vm-templatesVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : verify-network-filterVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : verify-vmsafe-cpumem-agentaddressVMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY