Item Search

NameAudit NamePluginCategory
1.2.3.2.2 Configure 'Do not process the run once list'CIS Windows 8 L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

1.7.3 Ensure GDM disable-user-list option is enabledCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS Debian Linux 11 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.3 Ensure GDM disable-user-list option is enabledCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Rocky Linux 8 Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

3.1.10 Secure the Java Development Kit Installation Path (JDK_PATH)CIS IBM DB2 11 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL, MEDIA PROTECTION

3.1.10 Secure the Java Development Kit Installation Path (JDK_PATH)CIS IBM DB2 11 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL, MEDIA PROTECTION

8.3.11 Set 'Allow installation of desktop items' to 'Enabled:Disable'CIS IE 11 v1.0.0Windows

CONFIGURATION MANAGEMENT

AIX7-00-003130 - The local initialization file lists of preloaded libraries must contain only absolute paths on AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AS24-W1-000270 - The Apache web server must provide install options to exclude the installation of documentation, sample code, example applications, and tutorials.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

CONFIGURATION MANAGEMENT

DTOO127 - Add-ins to Office applications must be signed by a Trusted PublisherDISA STIG Microsoft Publisher 2016 v1r3Windows

CONFIGURATION MANAGEMENT

DTOO127 - Add-ins to Office applications must be signed by a Trusted Publisher.DISA STIG Microsoft Excel 2016 v2r1Windows

CONFIGURATION MANAGEMENT

DTOO127 - Add-ins to Office applications must be signed by a Trusted Publisher.DISA STIG Microsoft PowerPoint 2016 v1r1Windows

CONFIGURATION MANAGEMENT

DTOO127 - Add-ins to Office applications must be signed by a Trusted Publisher.DISA STIG Microsoft Visio 2016 v1r1Windows

CONFIGURATION MANAGEMENT

DTOO286 - User Entries to Server List must be disallowed.DISA STIG Microsoft Outlook 2016 v2r3Windows

CONFIGURATION MANAGEMENT

FireEye - AAA LDAP binding user should not be an adminTNS FireEyeFireEye

ACCESS CONTROL

FireEye - AAA user mapping sourceTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - FENet patch updates are applied automaticallyTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

FireEye - FireEye Web MPS versionTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Inline blocking signature policy exceptionsTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - IPMI is enabledTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Workorder statsTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

GEN001902 - Local initialization files lists of preloaded libraries must contain only authorized paths.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002750 - The audit system must be configured to audit account creation - flags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002751 - The audit system must be configured to audit account modification - flags +ua and -uaDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN002751 - The audit system must be configured to audit account modification - flags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002752 - The audit system must be configured to audit account disabling - flags +ua and -uaDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN002752 - The audit system must be configured to audit account disabling - naflags +ua and -uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002753 - The audit system must be configured to audit account termination - flags uaDISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN002753 - The audit system must be configured to audit account termination - flags uaDISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - flags loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

Require that application add-ins are signed by Trusted Publisher - excelMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - powerpointMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - excelMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - ms projectMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - ms projectMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - powerpointMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - powerpointMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - publisherMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - wordMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - visioMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000228 - The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-07-010040 - The Red Hat Enterprise Linux operating system must display the approved Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a graphical user logon.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010050 - The Red Hat Enterprise Linux operating system must display the Standard Mandatory DoD Notice and Consent Banner before granting local or remote access to the system via a command line user logon.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-031010 - The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040400 - The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-040720 - The Red Hat Enterprise Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

XenServer - List VM CPU allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT