1.1.2 Enable 'aaa authentication login' | CIS Cisco IOS 15 L1 v4.1.1 | Cisco | ACCESS CONTROL |
1.8 Ensure 'Attachment Filtering Agent' is configured | CIS Microsoft Exchange Server 2019 L1 Edge v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
2.3.2 Set 'ip address' for 'ntp server' | CIS Cisco IOS 15 L1 v4.1.1 | Cisco | AUDIT AND ACCOUNTABILITY |
AMLS-L3-000240 - The Arista Multilayer Switch must be configured to disable non-essential capabilities. | DISA STIG Arista MLS DCS-7000 Series RTR v1r4 | Arista | CONFIGURATION MANAGEMENT |
ARST-RT-000260 - The Arista router must be configured to have all non-essential capabilities disabled. | DISA STIG Arista MLS EOS 4.2x Router v2r1 | Arista | CONFIGURATION MANAGEMENT |
Change the Rekeying Timer | Tenable Cisco Viptela SD-WAN - vEdge | Cisco_Viptela | ACCESS CONTROL |
CISC-ND-000570 - The Cisco router must be configured to enforce password complexity by requiring that at least one uppercase character be used. | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000570 - The Cisco router must be configured to enforce password complexity by requiring that at least one uppercase character be used. | DISA STIG Cisco IOS Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000580 - The Cisco router must be configured to enforce password complexity by requiring that at least one lowercase character be used. | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000580 - The Cisco router must be configured to enforce password complexity by requiring that at least one lowercase character be used. | DISA STIG Cisco IOS Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000590 - The Cisco router must be configured to enforce password complexity by requiring that at least one numeric character be used. | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000590 - The Cisco router must be configured to enforce password complexity by requiring that at least one numeric character be used. | DISA STIG Cisco IOS Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000600 - The Cisco router must be configured to enforce password complexity by requiring that at least one special character be used. | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-000600 - The Cisco router must be configured to enforce password complexity by requiring that at least one special character be used. | DISA STIG Cisco IOS Router NDM v3r2 | Cisco | IDENTIFICATION AND AUTHENTICATION |
CISC-ND-001000 - The Cisco router must be configured to generate an alert for all audit failure events. | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | AUDIT AND ACCOUNTABILITY |
CISC-ND-001000 - The Cisco router must be configured to generate an alert for all audit failure events. | DISA STIG Cisco IOS Router NDM v3r2 | Cisco | AUDIT AND ACCOUNTABILITY |
CISC-ND-001250 - The Cisco router must be configured to generate log records when administrator privileges are deleted. | DISA STIG Cisco IOS XE Router NDM v3r2 | Cisco | AUDIT AND ACCOUNTABILITY |
CISC-ND-001250 - The Cisco router must be configured to generate log records when administrator privileges are deleted. | DISA STIG Cisco IOS Router NDM v3r2 | Cisco | AUDIT AND ACCOUNTABILITY |
CISC-RT-000270 - The Cisco perimeter router must be configured to block inbound packets with source Bogon IP address prefixes. | DISA STIG Cisco IOS-XR Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000270 - The Cisco perimeter router must be configured to block inbound packets with source Bogon IP address prefixes. | DISA STIG Cisco IOS XE Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider. | DISA STIG Cisco IOS-XR Router RTR v3r2 | Cisco | ACCESS CONTROL |
CISC-RT-000380 - The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces. | DISA STIG Cisco IOS-XR Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000380 - The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces. | DISA STIG Cisco IOS XE Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000380 - The Cisco perimeter router must be configured to have Proxy ARP disabled on all external interfaces. | DISA STIG Cisco IOS Router RTR v3r2 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000391 - The Cisco perimeter switch must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces. | DISA STIG Cisco IOS XE Switch RTR v3r1 | Cisco | CONFIGURATION MANAGEMENT |
CISC-RT-000391 - The Cisco perimeter switch must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces. | DISA STIG Cisco IOS Switch RTR v3r1 | Cisco | CONFIGURATION MANAGEMENT |
DISA_Canonical_Ubuntu_22.04_LTS_STIG_v2r3.audit from DISA Canonical Ubuntu 22.04 LTS STIG v2r3 | DISA Canonical Ubuntu 22.04 LTS STIG v2r3 | Unix | |
DISA_CloudLinux_AlmaLinux_OS_9_STIG_v1r2.audit from DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | DISA CloudLinux AlmaLinux OS 9 STIG v1r2 | Unix | |
DISA_IBM_WebSphere_Traditional_9_v1r1_Middleware.audit for DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware | DISA IBM WebSphere Traditional 9 STIG v1r1 Middleware | Unix | |
DISA_STIG_Adobe_Acrobat_Pro_XI_v1r2.audit from DISA Adobe Acrobat Pro XI V1R2 STIG | DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2 | Windows | |
DISA_STIG_Apache_Tomcat_Application_Server_9_v3r1_Middleware.audit from DISA Apache Tomcat Application Server 9 v3r1 STIG | DISA STIG Apache Tomcat Application Server 9 v3r1 Middleware | Unix | |
DISA_STIG_Apple_macOS_12_v1r9.audit from DISA Apple macOS 12 (Monterey) v1r9 STIG | DISA STIG Apple macOS 12 v1r9 | Unix | |
DISA_STIG_Apple_macOS_13_v1r5.audit from DISA Apple macOS 13 (Ventura) v1r5 STIG | DISA STIG Apple macOS 13 v1r5 | Unix | |
DISA_STIG_Microsoft_Office_System_2016_v2r4.audit from DISA Microsoft Office System 2016 v2r4 STIG | DISA Microsoft Office System 2016 STIG v2r4 | Windows | |
DISA_STIG_Microsoft_Sharepoint_Designer_2013_v1r3.audit from DISA STIG Microsoft Sharepoint Designer 2013 v1r3 | DISA STIG Microsoft Sharepoint Designer 2013 v1r3 | Windows | |
DISA_STIG_Oracle_WebLogic_Server_12c_Linux_v2r2.audit from DISA Oracle WebLogic Server 12c v2r2 STIG | Oracle WebLogic Server 12c Linux v2r2 | Unix | |
DISA_STIG_SLES_15_v2r2.audit from DISA SUSE Linux Enterprise Server 15 v2r2 STIG | DISA SLES 15 STIG v2r2 | Unix | |
DISA_STIG_Ubuntu_16.04_LTS_v2r3.audit from DISA Canonical Ubuntu 16.04 LTS v2r3 STIG | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | |
DISA_STIG_Ubuntu_18.04_LTS_v2r15.audit from DISA Canonical Ubuntu 18.04 LTS v2r15 STIG | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | |
DISA_STIG_VMware_vSphere_6.7_Perfcharts_Tomcat_v1r3.audit from DISA VMware vSphere 6.7 Perfcharts Tomcat v1r3 STIG | DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3 | Unix | |
DISA_STIG_VMware_vSphere_6.7_Photon_OS_v1r6.audit from DISA VMware vSphere 6.7 Photon OS v1r6 STIG | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | |
DISA_STIG_VMware_vSphere_6.7_PostgreSQL_v1r2.audit from DISA VMware vSphere 6.7 PostgreSQL v1r2 STIG | DISA STIG VMware vSphere 6.7 PostgreSQL v1r2 | Unix | |
DISA_STIG_VMware_vSphere_ESXi_6.5_Bare_Metal_Host_v2r4.audit from DISA VMware vSphere 6.5 ESXi v2r4 STIG | DISA STIG VMware vSphere ESXi OS 6.5 v2r4 | Unix | |
DISA_VMware_vSphere_8.0_ESXi_STIG_v2r3.audit from DISA VMware vSphere 8.0 ESXi STIG v2r3 | DISA VMware vSphere 8.0 ESXi STIG v2r3 | Unix | |
F5BI-AP-000235 - The F5 BIG-IP appliance APM Access Policies that grant access to web application resources must allow only client certificates that have the User Persona Name (UPN) value in the User Persona Client Certificates. | DISA F5 BIG-IP Access Policy Manager STIG v2r4 | F5 | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-RT-000530 - The Juniper router must be configured to implement message authentication for all control plane protocols. | DISA Juniper EX Series Router v2r1 | Juniper | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - IS-IS type | DISA STIG Juniper Router RTR v3r2 | Juniper | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - OSPF | DISA STIG Juniper Router RTR v3r2 | Juniper | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP key | DISA STIG Juniper Router RTR v3r2 | Juniper | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
JUNI-RT-000020 - The Juniper router must be configured to implement message authentication for all control plane protocols - RIP type | DISA STIG Juniper Router RTR v3r2 | Juniper | ACCESS CONTROL, CONFIGURATION MANAGEMENT |