Item Search

NameAudit NamePluginCategory
AIOS-16-014800 - Apple iOS/iPadOS 16 must be configured to disable Auto Unlock of the iPhone by an Apple Watch.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AIOS-17-014800 - Apple iOS/iPadOS 17 must be configured to disable 'Auto Unlock' of the iPhone by an Apple Watch - Auto Unlock of the iPhone by an Apple Watch.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

AS24-U1-000690 - Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

ACCESS CONTROL

AS24-U1-000690 - Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

ACCESS CONTROL

AS24-W1-000690 - Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

ACCESS CONTROL

CNTR-R2-001130 - Rancher RKE2 must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.DISA Rancher Government Solutions RKE2 STIG v2r3Unix

ACCESS CONTROL

IIST-SV-000144 - IIS 10.0 web server system files must conform to minimum file permission requirements.DISA IIS 10.0 Server v2r10Windows

ACCESS CONTROL

IISW-SV-000144 - IIS 8.5 web server system files must conform to minimum file permission requirements.DISA IIS 8.5 Server v2r7Windows

ACCESS CONTROL

JBOS-AS-000475 - The application server must prevent non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

O365-CO-000010 - Users must be prevented from creating new trusted locations in the Trust Center.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

ACCESS CONTROL

RHEL-07-020021 - The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-020023 - The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-09-431016 - RHEL 9 must elevate the SELinux context when an administrator calls the sudo command.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

SOL-11.1-090120 - The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

WN10-UR-000050 - The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000065 - The Debug programs user right must only be assigned to the Administrators group.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000100 - The Force shutdown from a remote system user right must only be assigned to the Administrators group.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000110 - The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000145 - The Perform volume maintenance tasks user right must only be assigned to the Administrators group.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000150 - The Profile single process user right must only be assigned to the Administrators group.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN10-UR-000165 - The Take ownership of files or other objects user right must only be assigned to the Administrators group.DISA Microsoft Windows 10 STIG v3r4Windows

ACCESS CONTROL

WN12-RG-000001 - Standard user accounts must only have Read permissions to the Winlogon registry key.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key - compatabilityDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key - compatabilityDISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000001 - The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000007 - The Back up files and directories user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000012 - The Create a token object user right must not be assigned to any groups or accounts.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000014 - The Create permanent shared objects user right must not be assigned to any groups or accounts.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000015 - The Create symbolic links user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000028 - The Load and unload device drivers user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000028 - The Load and unload device drivers user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000029 - The Lock pages in memory user right must not be assigned to any groups or accounts.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-UR-000042 - The Take ownership of files or other objects user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN16-DC-000090 - Active Directory Group Policy objects must have proper access control permissions.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-DC-000420 - The Enable computer and user accounts to be trusted for delegation user right must only be assigned to the Administrators group on domain controllers.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-MS-000310 - Remote calls to the Security Account Manager (SAM) must be restricted to Administrators.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-MS-000420 - The 'Enable computer and user accounts to be trusted for delegation' user right must not be assigned to any groups or accounts on member servers.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000100 - The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000200 - The Force shutdown from a remote system user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000250 - The Lock pages in memory user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN16-UR-000280 - The Perform volume maintenance tasks user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN19-00-000170 - Windows Server 2019 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-DC-000080 - Windows Server 2019 Active Directory SYSVOL directory must have the proper access control permissions.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-DC-000100 - Windows Server 2019 Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000020 - Windows Server 2019 Act as part of the operating system user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000070 - Windows Server 2019 Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000100 - Windows Server 2019 Debug programs: user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000130 - Windows Server 2019 Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000140 - Windows Server 2019 Increase scheduling priority: user right must only be assigned to the Administrators group.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-UR-000160 - Windows Server 2019 Lock pages in memory user right must not be assigned to any groups or accounts.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL