Item Search

NameAudit NamePluginCategory
AIOS-12-012100 - Apple iOS must implement the management setting: force Apple Watch wrist detection.MobileIron - DISA Apple iOS 12 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-13-012100 - Apple iOS/iPadOS must implement the management setting: force Apple Watch wrist detection.AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-15-001000 - Apple iOS/iPadOS 15 must provide the capability for the Administrator (MDM) to perform the following management function: enable/disable VPN protection across the device and [selection: other methods].MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-712300 - Apple iOS/iPadOS 16 must not allow managed apps to write contacts to unmanaged contacts accounts.MobileIron - DISA Apple iOS/iPadOS BYOAD 16 v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-712400 - Apple iOS/iPadOS 16 must not allow unmanaged apps to read contacts from managed contacts accounts.AirWatch - DISA Apple iOS/iPadOS 16 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-011600 - Apple iOS/iPadOS 17 must implement the management setting: not have any Family Members in Family Sharing.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

AIOS-17-012500 - Apple iOS/iPadOS 17 must implement the management setting: disable AirDrop.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-17-013100 - Apple iOS/iPadOS 17 must disable 'Find My Friends' in the 'Find My' app - Find My app.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AOSX-14-002062 - The macOS system must be configured with Bluetooth turned off unless approved by the organization.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-002009 - The macOS system must be configured to disable AirDrop - allowAirDropDISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

AOSX-15-002009 - The macOS system must be configured to disable AirDrop - DisableAirDropDISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

AOSX-15-002062 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - HiddenPreferencePanesDISA STIG Apple Mac OSX 10.15 v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000090 - The Cisco switch must have Root Guard enabled on all switch ports connecting to access layer switches.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000060 - The Cisco router must be configured to have all inactive interfaces disabled.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000200 - The Cisco router must be configured to log all packets that have been dropped at interfaces via ACL.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-RT-000230 - The Cisco router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000300 - The Cisco perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an Interior Gateway Protocol (IGP) peering with the NIPRNet or to other autonomous systems.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000470 - The Cisco BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000470 - The Cisco BGP switch must be configured to enable the Generalized TTL Security Mechanism (GTSM).DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic.DISA STIG Cisco IOS Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000830 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated switch (DR) for any undesirable multicast groups and sources.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000840 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Cisco switch (DR) for any undesirable multicast groups.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000940 - The Cisco Multicast Source Discovery Protocol (MSDP) router must be configured to limit the amount of source-active messages it accepts on a per-peer basis.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

F5BI-LT-000023 - The BIG-IP Core implementation must be configured to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

ACCESS CONTROL

JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - dhcpDISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUNI-RT-000070 - The Juniper router must be configured to have all non-essential capabilities disabled - telnetDISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUNI-RT-000580 - The Juniper MPLS router must be configured to synchronize IGP and LDP to minimize packet loss when an IGP adjacency is established prior to LDP peers completing label exchange - OSPFDISA STIG Juniper Router RTR v3r2Juniper

CONFIGURATION MANAGEMENT

JUNI-RT-000830 - The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Juniper router (DR) for any undesirable multicast groups - protocols pimDISA STIG Juniper Router RTR v3r2Juniper

ACCESS CONTROL

JUSX-DM-000044 - The Juniper SRX Services Gateway must generate log records when privileged commands are executed.DISA Juniper SRX Services Gateway NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

JUSX-DM-000164 - The Juniper SRX Services Gateway must implement service redundancy to protect against or limit the effects of common types of Denial of Service (DoS) attacks on the device itself.DISA Juniper SRX Services Gateway NDM v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O121-BP-021500 - A minimum of two Oracle control files must be defined and configured to be stored on separate, archived disks (physical or virtual) or archived partitions on a RAID device.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

OH12-1X-000117 - OHS must have the IfModule cgid_module directive disabled.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000146 - OHS must have the IfModule dumpio_module directive disabled.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000149 - OHS must have the IfModule mpm_winnt_module directive disabled.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000198 - OHS must have the HostnameLookups directive enabled.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000206 - OHS must have the RewriteLog directive set properly.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OL07-00-040530 - The Oracle Linux operating system must display the date and time of the last successful account logon upon logon.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

SLES-12-010390 - The SUSE operating system must display the date and time of the last successful account logon upon logon.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL

SLES-12-010860 - The SUSE operating system must use a separate file system for /var.DISA SLES 12 STIG v3r2Unix

CONFIGURATION MANAGEMENT

SLES-12-030310 - The SUSE operating system must be configured to use Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).DISA SLES 12 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY

SQL6-D0-017800 - The SQL Server Browser service must be disabled unless specifically required and approved.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

CONFIGURATION MANAGEMENT

SQL6-D0-018000 - If the SQL Server Browser Service is specifically required and approved, SQL instances must be hidden.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

TCAT-AS-000550 - xpoweredBy attribute must be disabled.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

CONFIGURATION MANAGEMENT

TCAT-AS-001660 - STRICT_SERVLET_COMPLIANCE must be set to true.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

CONFIGURATION MANAGEMENT

WN10-00-000085 - Standard local user accounts must not exist on a system in a domain.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-CC-000206 - Windows Update must not obtain updates from other PCs on the internet.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-CC-000220 - Turning off File Explorer heap termination on corruption must be disabled.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000055 - The maximum age for machine account passwords must be configured to 30 days or less.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN10-SO-000085 - Caching of logon credentials must be limited.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN19-CC-000060 - Windows Server 2019 must be configured to ignore NetBIOS name release requests except from WINS servers.DISA Microsoft Windows Server 2019 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION