Item Search

NameAudit NamePluginCategory
1.8 UBTU-24-100120CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIUnix

SYSTEM AND INFORMATION INTEGRITY

1.43 OL08-00-010293CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.112 UBTU-22-651015CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIUnix

SYSTEM AND INFORMATION INTEGRITY

2.2.33 Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.33 Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.42 Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2025 v2.0.0 L1 MSWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.42 Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2025 v2.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.12 Ensure access keys are rotated every 90 days or lessCIS Amazon Web Services Foundations v7.0.0 L1amazon_aws

ACCESS CONTROL

2.18 Ensure that IAM External Access Analyzer is enabled for all regionsCIS Amazon Web Services Foundations v7.0.0 L1amazon_aws

ACCESS CONTROL, MEDIA PROTECTION

4.3.4.12 Ensure klogin daemon is not in useCIS IBM AIX 7 v1.1.0 L1Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure that all 'privileged' role assignments are periodically reviewedCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.8 Ensure that 'Inline Cloud Analysis' on Wildfire profiles is enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.13 Bind incoming container traffic to a specific host interfaceCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.13 Ensure incoming container traffic is binded to a specific host interfaceCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

8.1.3.1 Ensure that Defender for Servers is set to 'On'CIS Microsoft Azure Foundations v5.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.9.24.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - AntiDetoursCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.2 Ensure 'Default Action and Mitigation Settings' is set to 'Enabled' (plus subsettings) - DeepHooksCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

ALMA-09-003100 - AlmaLinux OS 9 must implement DOD-approved encryption ciphers to protect the confidentiality of SSH connections.DISA Cloud Linux AlmaLinux OS 9 STIG v1r6Unix

ACCESS CONTROL

ALMA-09-003210 - AlmaLinux OS 9 SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms.DISA Cloud Linux AlmaLinux OS 9 STIG v1r6Unix

ACCESS CONTROL

ALMA-09-003540 - The AlmaLinux OS 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Cloud Linux AlmaLinux OS 9 STIG v1r6Unix

ACCESS CONTROL

AZLX-23-001205 - Amazon Linux 2023 server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-2/140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Amazon Linux 2023 STIG v1r2Unix

ACCESS CONTROL

DTAM132 - McAfee VirusScan Buffer Overflow Protection Buffer Overflow Settings must be configured to display a dialog box when a buffer overflow is detected.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM132 - McAfee VirusScan Buffer Overflow Protection Policies must be configured to display a dialog box when a buffer overflow is detected.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisEnabledDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisLevelDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM137 - McAfee VirusScan On-Access Scanner General Settings Artemis Heuristic network check for suspicious files must be enabled and set to sensitivity level Medium or higher - ArtemisEnabledDISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM157 - McAfee VirusScan On-Delivery Email Scan Policies Artemis sensitivity level must be configured to medium or higher - enabledDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM157 - McAfee VirusScan On-Delivery Email Scan Policies Artemis sensitivity level must be configured to medium or higher.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM157 - McAfee VirusScan On-Delivery Email Scanner Artemis sensitivity level must be configured to Medium or higher.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAVSEL-108 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must only be configured with exclusions which are documented and approved by the ISSO/ISSM/AO.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-003010 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-MB-003030 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-003010 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-MB-002880 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

F5BI-LT-000221 - The BIG-IP Core implementation must be configured to protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000004 - The Juniper Networks SRX Series Gateway IDPS must provide audit record generation with a configurable severity and escalation level capability.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

AUDIT AND ACCOUNTABILITY

OL08-00-010184 - The OL 8 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Oracle Linux 8 STIG v2r8Unix

ACCESS CONTROL

OL09-00-000261 - OL 9 SSH client must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Oracle Linux 9 STIG v1r5Unix

ACCESS CONTROL

OL09-00-000262 - OL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Oracle Linux 9 STIG v1r5Unix

ACCESS CONTROL

OL09-00-002390 - OL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.DISA Oracle Linux 9 STIG v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-08-010296 - The RHEL 8 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-09-255065 - The RHEL 9 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

ACCESS CONTROL

RHEL-09-255070 - The RHEL 9 SSH client must be configured to use only DOD-approved Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

ACCESS CONTROL

RHEL-09-255075 - The RHEL 9 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

ACCESS CONTROL

RHEL-09-431025 - RHEL 9 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-651010 - RHEL 9 must have the AIDE package installed.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLEM-05-255050 - SLEM 5 SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2/140-3 approved cryptographic hash algorithms.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r4Unix

MAINTENANCE

SOL-11.1-120410 - The operating system must monitor for unauthorized connections of mobile devices to organizational information systems.DISA Solaris 11 SPARC STIG v3r4Unix

CONFIGURATION MANAGEMENT

UBTU-22-651025 - Ubuntu 22.04 LTS must be configured so that the script that runs each 30 days or less to check file integrity is the default.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-24-100860 - Ubuntu 24.04 LTS SSH client must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3 validated cryptographic hash algorithms.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

ACCESS CONTROL