Item Search

NameAudit NamePluginCategory
DTAVSEL-005 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown program viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-005 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown program viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-011 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner maximum scan time must not be less than 45 seconds - scanMaxTmoMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-013 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-015 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Clean as first action when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-018 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to allow access to files if scanning times out.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-019 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be enabled to scan mounted volumes when mounted volumes point to a network server without an anti-virus solution installed.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-101 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to decompress archives when scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-104 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to find potentially unwanted programs.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-106 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-107 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-110 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-113 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to include all local drives and their sub-directories.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-200 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must scan all media used for system maintenance prior to use.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

MAINTENANCE

DTAVSEL-201 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to receive all patches, service packs and updates from a DoD-managed source.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

CONFIGURATION MANAGEMENT

DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - userMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

ACCESS CONTROL

FGFW-ND-000105 - The FortiGate device must allocate audit record storage capacity in accordance with organization-defined audit record storage requirementsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FNFG-FW-000020 - The FortiGate firewall must generate traffic log entries containing information to establish what type of events occurred.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

FNFG-FW-000040 - The FortiGate firewall must generate traffic log entries containing information to establish the outcome of the events, such as, at a minimum, the success or failure of the application of the firewall rule.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

FNFG-FW-000160 - The FortiGate firewall must generate traffic log records when traffic is denied, restricted, or discarded.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

GOOG-11-000200 - Google Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - CharactersAirWatch - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-11-000200 - Google Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - NumbersAirWatch - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-11-002800 - Google Android 11 must be configured to disable developer modes.MobileIron - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-11-009400 - Google Android 11 work profile must be configured to enforce the system application disable list.MobileIron - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-11-009600 - Google Android 11 must be provisioned as a fully managed device and configured to create a work profile.MobileIron - DISA Google Android 11 COPE v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-12-006200 - Google Android 12 must be configured to enable a screen-lock policy that will lock the display after a period of inactivity.MobileIron - DISA Google Android 12 COBO v1r2MDM

ACCESS CONTROL

GOOG-12-008500 - Google Android 12 must be configured to not allow backup of [all applications, configuration data] to locally connected systems.AirWatch - DISA Google Android 12 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-009500 - Google Android 12 must be configured to disable ad hoc wireless client-to-client connection capability.AirWatch - DISA Google Android 12 COPE v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

GOOG-12-009900 - Google Android 12 must be configured to enforce that Wi-Fi Sharing is disabled.AirWatch - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-010200 - Google Android 12 work profile must be configured to enforce the system application disable list.AirWatch - DISA Google Android 12 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-010600 - Google Android 12 must be configured to disallow configuration of date and time.AirWatch - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-706700 - Google Android 13 allowlist must be configured to not include applications with the following characteristics (work profile only):MobileIron - DISA Google Android 13 BYOD v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-710000 - Google Android 13 must have the DOD root and intermediate PKI certificates installed (work profile only).MobileIron - DISA Google Android 13 BYOD v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-710200 - The Google Android 13 work profile must be configured to enforce the system application disable list (work profile only).MobileIron - DISA Google Android 13 BYOD v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-706500 - Google Android 14 must be configured to enforce an application installation policy by specifying one or more authorized application repositories.MobileIron - DISA Google Android 14 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

GOOG-14-707700 - Google Android 14 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the Work Profile.AirWatch - DISA Google Android 14 BYOAD v1r1MDM

ACCESS CONTROL

GOOG-14-707700 - Google Android 14 must be configured to display the DOD advisory warning message at startup or each time the user unlocks the Work Profile.MobileIron - DISA Google Android 14 BYOAD v1r1MDM

ACCESS CONTROL

GOOG-14-710000 - Google Android 14 must have the DOD root and intermediate PKI certificates installed (work profile only) - work profile only.AirWatch - DISA Google Android 14 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

GOOG-14-710000 - Google Android 14 must have the DOD root and intermediate PKI certificates installed (work profile only) - work profile only.MobileIron - DISA Google Android 14 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

GOOG-14-710800 - Android 14 devices must have the latest available Google Android 14 operating system installed.AirWatch - DISA Google Android 14 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

GOOG-14-710900 - Android 14 devices must be configured to disable the use of third-party keyboards (work profile only) - work profile only.AirWatch - DISA Google Android 14 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

MSFT-11-000200 - Microsoft Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - CharactersAirWatch - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-000200 - Microsoft Android 11 must be configured to not allow passwords that include more than two repeating or sequential characters - Minimum complex charactersMobileIron - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-000400 - Microsoft Android 11 must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Microsoft Android 11 COBO v1r2MDM

ACCESS CONTROL

MSFT-11-001100 - Microsoft Android 11 allow list must be configured to not include applications with the following characteristics:MobileIron - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-002800 - Microsoft Android 11 must be configured to disable developer modes.AirWatch - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-003500 - Microsoft Android 11 must be configured to disable USB mass storage mode.MobileIron - DISA Microsoft Android 11 COBO v1r2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-006100 - Microsoft Android 11 must be configured to generate audit records for the following auditable events: Detected integrity violations.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

AUDIT AND ACCOUNTABILITY

MSFT-11-010000 - Microsoft Android 11 Work Profile must be configured to disable the autofill services.AirWatch - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-010200 - Microsoft Android 11 must be configured to disallow configuration of date and time.AirWatch - DISA Microsoft Android 11 COBO v1r2MDM

CONFIGURATION MANAGEMENT