Item Search

NameAudit NamePluginCategory
2.3.11.7 Ensure 'Network security: LAN Manager authentication level' is set to 'Send NTLMv2 response only. Refuse LM & NTLM'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION

5.5.1.3 Ensure password expiration warning days is 7 or more - login.defsCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

9.1 Starting Tomcat with Security ManagerCIS Apache Tomcat 8 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

20.31 Ensure 'Host-based firewall is installed and enabled'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

DTBI715 - Crash Detection must be enforced.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

CONFIGURATION MANAGEMENT

DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - The Internet Explorer Bind to Object functionality must be enabled.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - The Saved from URL mark must be selected to enforce Internet zone processing.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Scripted Window Security must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - Add-on Management functionality must be allowed.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO211 - ActiveX Installs must be configured for proper restriction.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO999-OneNote13 - The version of OneNote running on the system must be a supported version.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND INFORMATION INTEGRITY

FGFW-ND-000010 - The FortiGate device must automatically audit account modificationDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000045 - The FortiGate device must enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutesDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000050 - The FortiGate device must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000085 - The FortiGate device must generate audit records showing starting and ending time for administrator access to the systemDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000090 - The FortiGate device must generate audit records when concurrent logons from different workstations occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000100 - The FortiGate device must generate audit records containing the full-text recording of privileged commands.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000125 - The FortiGate device must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000130 - The FortiGate device must protect audit information from unauthorized deletion.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000140 - The FortiGate device must protect audit tools from unauthorized modification.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000160 - The FortiGate device must enforce access restrictions associated with changes to the system components.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000185 - The FortiGate device must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

FGFW-ND-000190 - FortiGate devices performing maintenance functions must restrict use of these functions to authorized personnel only.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, MAINTENANCE

FGFW-ND-000195 - The FortiGate device must use DoD-approved Certificate Authorities (CAs) for public key certificates.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000210 - The FortiGate device must authenticate SNMP messages using a FIPS-validated Keyed-Hash Message Authentication Code (HMAC)DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000215 - The FortiGate device must authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000220 - The FortiGate device must enforce a minimum 15-character password length.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000225 - The FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000230 - The FortiGate device must enforce password complexity by requiring that at least one lowercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000240 - The FortiGate device must enforce password complexity by requiring that at least one special character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000250 - The FortiGate device must not have any default manufacturer passwords when deployed.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000260 - The FortiGate devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of nonlocal maintenance and diagnostic communications.DISA Fortigate Firewall NDM STIG v1r4FortiGate

MAINTENANCE

FGFW-ND-000280 - The FortiGate device must generate unique session identifiers using a FIPS 140-2-approved random number generator.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000285 - The FortiGate device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000290 - The FortiGate device must protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000300 - The FortiGate device must limit the number of logon and user sessionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

VCST-67-000013 - The Security Token Service must have mappings set for Java servlet pages.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

CONFIGURATION MANAGEMENT

WN10-00-000150 - Structured Exception Handling Overwrite Protection (SEHOP) must be enabled.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND INFORMATION INTEGRITY

WN10-00-000170 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-CC-000030 - The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN12-SO-000037 - IPv6 source routing must be configured to the highest protection level.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-SO-000043 - The system must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000044 - The system must be configured to disable the Internet Router Discovery Protocol (IRDP).DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000047 - IPv6 TCP data retransmissions must be configured to prevent resources from becoming exhausted.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-00-000412 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN16-MS-000020 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Microsoft Windows Server 2016 STIG v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-MS-000020 - Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Microsoft Windows Server 2019 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-CC-000020 - Windows Server 2022 must have WDigest Authentication disabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT