Item Search

NameAudit NamePluginCategory
AIOS-17-010850 - Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AMLS-NM-000200 - The Arista Multilayer Switch must generate audit records containing the full-text recording of privileged commands.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AOSX-15-000006 - The macOS system must conceal, via the session lock, information previously visible on the display with a publicly viewable image.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

APPL-11-002013 - The macOS system must be configured to disable the iCloud Reminders services.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-12-002012 - The macOS system must be configured to disable the iCloud Calendar services.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-12-002015 - The macOS system must be configured to disable the Mail iCloud services.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

BIND-9X-001040 - The BIND 9.x server implementation must be configured with a channel to send audit records to a remote syslog.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

BIND-9X-001042 - The BIND 9.x server implementation must maintain at least 3 file versions of the local log file.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

EX13-EG-000105 - Exchange Global Outbound Message size must be controlled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000115 - Exchange Send connector connections count must be limited.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000195 - Exchange Send connectors must be clearly named.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000205 - Exchange Message size restrictions must be controlled on Send connectors.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000215 - The Exchange global inbound message size must be controlled.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000000-LNX00800 - Use a Linux Security Module configured to limit privileges of system services - 'SELINUXTYPE = targeted or strict'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/sfw/man/*DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0655 or less permissive - /usr/sfw/share/man/*DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002260 - The system must be checked for extraneous device files at least weekly.DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN002750 - The audit system must be configured to audit account creation - flags +ua and -uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002751 - The audit system must be configured to audit account modification - naflags +ua and -uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002752 - The audit system must be configured to audit account disabling - flags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - usedDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN008820 - The system package management tool must not automatically obtain updates - /var/spool/cron/atjobs/*DISA STIG Solaris 10 SPARC v2r4Unix

SYSTEM AND INFORMATION INTEGRITY

GOOG-11-001400 - Google Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP).MobileIron - DISA Google Android 11 COBO v2r1MDM

CONFIGURATION MANAGEMENT

GOOG-12-009400 - Google Android 12 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), Hands-Free Profile (HFP), and Serial Port Profile (SPP).AirWatch - DISA Google Android 12 COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-001400 - The Honeywell Mobility Edge Android Pie device must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only HSP (Headset Profile), HFP (HandsFree Profile), or SPP (Serial Port Profile) capable devices - Serial Port Profile capable devices.AirWatch - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

MSFT-11-001400 - Microsoft Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP) - Serial Port Profile capable devices.MobileIron - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

OL6-00-000174 - The operating system must automatically audit account creation - '/etc/security/opasswd'DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000177 - The operating system must automatically audit account termination - '/etc/security/opasswd'DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000530 - The Oracle Linux operating system must mount /dev/shm with the nodev option.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-06-000177 - The operating system must automatically audit account termination - /etc/security/opasswd.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000198 - The audit system must be configured to audit all use of setuid and setgid programs.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000509 - The system must forward audit records to the syslog service.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000532 - The Red Hat Enterprise Linux operating system must mount /dev/shm with the noexec option.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SOL-11.1-010310 - The audit system must be configured to audit login, logout, and session initiation.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL

SOL-11.1-040020 - The operating system must automatically terminate temporary accounts within 72 hours.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

SOL-11.1-060170 - The operating system must employ cryptographic mechanisms to prevent unauthorized disclosure of information at rest unless otherwise protected by alternative physical measures.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-060180 - The operating system must use cryptographic mechanisms to protect the integrity of audit information.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SPLK-CL-000235 - Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

SPLK-CL-000290 - Splunk Enterprise must be configured to send an immediate alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

WBSP-AS-001480 - The WebSphere Application servers with an RMF categorization of high must be in a high-availability (HA) cluster.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001480 - The WebSphere Application servers with an RMF categorization of high must be in a high-availability (HA) cluster.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WNFWA-000018 - Windows Defender Firewall with Advanced Security must log dropped packets when connected to a private network.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

WNFWA-000027 - Windows Defender Firewall with Advanced Security log size must be configured for public network connections.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

WNFWA-000028 - Windows Defender Firewall with Advanced Security must log dropped packets when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

ZEBR-10-001400 - Zebra Android 10 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP) - Serial Port Profile capable devices.AirWatch - DISA Zebra Android 10 COBO v1r2MDM

CONFIGURATION MANAGEMENT

ZEBR-10-001400 - Zebra Android 10 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP) - Serial Port Profile capable devices.AirWatch - DISA Zebra Android 10 COPE v1r2MDM

CONFIGURATION MANAGEMENT

ZEBR-11-001400 - Zebra Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP) - Serial Port Profile capable devices.AirWatch - DISA Zebra Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT

ZEBR-11-001400 - Zebra Android 11 must be configured to disable Bluetooth or configured via User Based Enforcement (UBE) to allow Bluetooth for only Headset Profile (HSP), HandsFree Profile (HFP), and Serial Port Profile (SPP) - Serial Port Profile capable devices.MobileIron - DISA Zebra Android 11 COBO v1r3MDM

CONFIGURATION MANAGEMENT