Item Search

NameAudit NamePluginCategory
1.22 UBTU-24-100800CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.23 UBTU-24-100810CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.55 UBTU-22-255010CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.56 UBTU-22-255015CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.305 OL08-00-040110CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.306 OL08-00-040111CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Ensure wireless interfaces are disabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.2 Ensure SSH is runningCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

SYSTEM AND COMMUNICATIONS PROTECTION

ALMA-09-043250 - AlmaLinux OS 9 wireless network adapters must be disabled.DISA CloudLinux AlmaLinux OS 9 STIG v1r3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U1-000870 - Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie dataDISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN007841 - Wireless network adapters must be disabled.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000152 - IIS 10.0 web server session IDs must be sent to the client using TLS.DISA IIS 10.0 Server v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version.DISA IIS 10.0 Server v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-040310 - The Oracle Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission.DISA Oracle Linux 7 STIG v3r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-040110 - OL 8 wireless network adapters must be disabled.DISA Oracle Linux 8 STIG v2r5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-040111 - OL 8 Bluetooth must be disabled.DISA Oracle Linux 8 STIG v2r5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010380 - The SUSE operating system wireless network adapters must be disabled unless approved and documented.DISA SUSE Linux Enterprise Server 15 STIG v2r5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-060100 - The operating system must protect the confidentiality of transmitted information.DISA Solaris 11 SPARC STIG v3r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-060190 - The operating system must protect the integrity of transmitted information.DISA Solaris 11 SPARC STIG v3r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010042 - The Ubuntu operating system must use SSH to protect the confidentiality and integrity of transmitted information.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-255010 - Ubuntu 22.04 LTS must have SSH installed.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-255015 - Ubuntu 22.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-100800 - Ubuntu 24.04 LTS must have SSH installed.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-100810 - Ubuntu 24.04 LTS must use SSH to protect the confidentiality and integrity of transmitted information.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCEM-70-000004 - ESX Agent Manager must protect cookies from cross-site scripting (XSS).DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCFL-67-000004 - vSphere Client must protect cookies from XSS.DISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCLD-67-000002 - VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

VCLD-70-000002 - VAMI must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.DISA STIG VMware vSphere 7.0 VAMI v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCLU-70-000004 - Lookup Service must protect cookies from cross-site scripting (XSS) - XSS.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCST-67-000004 - The Security Token Service must protect cookies from XSS.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCST-70-000004 - The Security Token Service must protect cookies from cross-site scripting (XSS).DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Wireless network adapters must be disabledDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000045 - Outgoing secure channel traffic must be signed when possible.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000120 - The Windows SMB server must be configured to always perform SMB packet signing.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000013 - Outgoing secure channel traffic must be encrypted when possible.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000017 - The system must be configured to require a strong session key.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000028 - The Windows SMB client must be configured to always perform SMB packet signing.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000028 - The Windows SMB client must be configured to always perform SMB packet signing.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000029 - The Windows SMB client must be enabled to perform SMB packet signing when possible.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000032 - The Windows SMB server must be configured to always perform SMB packet signing.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000032 - The Windows SMB server must be configured to always perform SMB packet signing.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000033 - The Windows SMB server must perform SMB packet signing when possible.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000033 - The Windows SMB server must perform SMB packet signing when possible.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000200 - The setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.DISA Microsoft Windows Server 2016 STIG v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000060 - Windows Server 2019 setting Domain member: Digitally encrypt or sign secure channel data (always) must be configured to Enabled.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000070 - Windows Server 2019 setting Domain member: Digitally encrypt secure channel data (when possible) must be configured to enabled.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000080 - Windows Server 2019 setting Domain member: Digitally sign secure channel data (when possible) must be configured to Enabled.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000170 - Windows Server 2019 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000200 - Windows Server 2019 setting Microsoft network server: Digitally sign communications (if client agrees) must be configured to Enabled.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000170 - Windows Server 2022 setting Microsoft network client: Digitally sign communications (if server agrees) must be configured to Enabled.DISA Microsoft Windows Server 2022 STIG v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION