Item Search

NameAudit NamePluginCategory
1.5.3 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Defender Antivirus v1.0.0 L1 ServerWindows

CONFIGURATION MANAGEMENT

1.6.13 Ensure the OpenSSL library is configured to use only DoD-approved TLS encryptionCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.28 UBTU-24-100860CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.44 OL08-00-010294CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.114 UBTU-22-651025CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIUnix

SYSTEM AND INFORMATION INTEGRITY

1.213 RHEL-09-255060CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.215 RHEL-09-255065CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.216 RHEL-09-255070CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

2.2.1 Enable 'Set time and date automatically' - Set time and date automaticallyCIS Apple macOS 10.13 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

2.2.1 Enable 'Set time and date automatically' - Set time and date automaticallyCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

2.2.32 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 L1 MSWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.34 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.34 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.40 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.40 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.42 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.42 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.42 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.42 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.43 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.43 (L1) Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.7 Ensure internal sources are blocked on external networksCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

5.2.2.8 (L2) Ensure 'sign-in risk' is blocked for medium and high riskCIS Microsoft 365 Foundations v6.0.1 L2 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire'CIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.20 Ensure that 'Wildfire Inline ML Action' on antivirus profiles are set to reset-both on all decoders except 'imap' and 'pop3'CIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

8.1.3.3 Ensure that 'Endpoint protection' component status is set to 'On'CIS Microsoft Azure Foundations v5.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

89.29 (L1) Ensure 'Profile Single Process' is set to 'Administrators'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AZLX-23-001065 - Amazon Linux 2023 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.DISA Amazon Linux 2023 STIG v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

AZLX-23-002570 - Amazon Linux 2023 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.DISA Amazon Linux 2023 STIG v1r2Unix

CONFIGURATION MANAGEMENT

BIND-9X-001470 - Every NS record in a zone file on a BIND 9.x server must point to an active name server and that name server must be authoritative for the domain specified in that record.DISA BIND 9.x STIG v3r1Unix

CONFIGURATION MANAGEMENT

DKER-EE-002160 - Docker Enterprise incoming container traffic must be bound to a specific host interface.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DTAM091 - McAfee VirusScan On-Access General Policies must be configured to block the connection when a threatened file is detected in a shared folder.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM092 - McAfee VirusScan On-Access General Policies must be configured to unblock connections after a minimum of 30 minutes.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

F5BI-AP-300059 - The F5 BIG-IP appliance providing content filtering must employ rate-based attack prevention behavior analysis.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-LT-000215 - The BIG-IP Core implementation must be configured to protect against known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis when providing content filtering to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000026 - The Juniper Networks SRX Series Gateway IDPS must automatically install updates to signature definitions.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

MD7X-00-007400 MongoDB must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

O19C-00-016800 - Oracle Database must take steps to protect data at rest and ensure confidentiality and integrity of application data.DISA Oracle Database 19c STIG v1r5 OracleDBOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000032 - To protect against unauthorized data mining, the Palo Alto Networks security platform must detect and prevent SQL and other code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA Palo Alto Networks IDPS STIG v3r2Palo_Alto

ACCESS CONTROL

RHEL-08-010290 - The RHEL 8 SSH server must be configured to use only Message Authentication Codes (MACs) employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-08-010291 - The RHEL 8 SSH server must be configured to use only DOD-approved encryption ciphers employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH server connections.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEL-10-200633 - RHEL 10 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SQL4-00-011300 - Where SQL Server Trace is in use for auditing purposes, SQL Server must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be traced.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

UBTU-18-010417 - The Ubuntu operating system must configure the SSH daemon to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms to protect the integrity of nonlocal maintenance and diagnostic communications.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL, MAINTENANCE

UBTU-22-255055 - Ubuntu 22.04 LTS must configure the SSH daemon to use Message Authentication Codes (MACs) employing FIPS 140-3-approved cryptographic hashes to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.DISA Canonical Ubuntu 22.04 LTS STIG v2r8Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-100820 - Ubuntu 24.04 LTS must configure the SSH daemon to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-100850 - Ubuntu 24.04 LTS must configure the SSH client to use FIPS 140-3 approved ciphers to prevent the unauthorized disclosure of information and/or detect changes to information during transmission.DISA Canonical Ubuntu 24.04 LTS STIG v1r5Unix

ACCESS CONTROL

WDNS-SI-000005 - The Windows 2012 DNS Server must, when a component failure is detected, activate a notification to the system administrator.DISA Microsoft Windows 2012 Server Domain Name System STIG v2r7Windows

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

WG204 IIS6 - A web server must not be co-hosted with other servicesDISA STIG IIS 6.0 Server v6r16Windows

CONFIGURATION MANAGEMENT

WG204 W22 - A web server installation must be segregated from other services.DISA STIG Apache Server 2.2 Windows v1r13Windows