Item Search

NameAudit NamePluginCategory
ESXI-65-000037 - The ESXi host must use Active Directory for local user authentication.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-65-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-65-000054 - The ESXi host must enable bidirectional CHAP authentication for iSCSI traffic.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

GEN000244 - The system must use time sources local to the enclave.DISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000054 - Users must be warned 7 days in advance of password expiration.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000093 - The system must ignore ICMPv4 bogus error responses - sysctlDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000126 - The Reliable Datagram Sockets (RDS) protocol must be disabled unless required.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000138 - System logs must be rotated daily - RPM check.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000138 - System logs must be rotated daily.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000167 - The audit system must be configured to audit all attempts to alter system time through settimeofday - 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000169 - The audit system must be configured to audit all attempts to alter system time through stime.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000182 - The audit system must be configured to audit modifications to the systems network configuration - setdomainname 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000182 - The audit system must be configured to audit modifications to the systems network configuration - sethostname 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000182 - The audit system must be configured to audit modifications to the systems network configuration - sethostname 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000186 - The audit system must be configured to audit all discretionary access control permission modifications using fchmod - auid=0 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000186 - The audit system must be configured to audit all discretionary access control permission modifications using fchmod - auid=0 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000187 - The audit system must be configured to audit all discretionary access control permission modifications using fchmodat - auid=0 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000187 - The audit system must be configured to audit all discretionary access control permission modifications using fchmodat - auid=0 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000187 - The audit system must be configured to audit all discretionary access control permission modifications using fchmodat - auid>=500 32 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000188 - The audit system must be configured to audit all discretionary access control permission modifications using fchown - auid=0 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

RHEL-06-000189 - The audit system must be configured to audit all discretionary access control permission modifications using fchownat - auid>=500 64 bitDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-010340 - The audit system must be configured to audit failed attempts to access files and programs.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-010360 - The auditing system must not define a different auditing level for specific users.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020120 - The pidgin IM client package must not be installed.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-030040 - Systems services that are not required must be disabled.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040110 - The system must require passwords to contain no more than three consecutive repeating characters.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040110 - The system must require passwords to contain no more than three consecutive repeating characters.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040270 - The value mesg n must be configured as the default setting for all users.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040340 - Consecutive login attempts for SSH must be limited to 3.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040380 - The operating system must terminate the network connection associated with a communications session at the end of the session or after 10 minutes of inactivity.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-040500 - The operating system must limit the number of concurrent sessions for each account to an organization-defined number of sessions.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

SOL-11.1-050040 - The system must not respond to ICMP broadcast netmask requests.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050060 - The system must not respond to multicast echo requests.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050100 - The system must disable TCP reverse IP source routing.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-070190 - All valid SUID/SGID files must be documented.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-070240 - The operating system must reveal error messages only to authorized personnel.DISA STIG Solaris 11 SPARC v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-070240 - The operating system must reveal error messages only to authorized personnel.DISA STIG Solaris 11 X86 v3r1Unix

SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-080030 - Address Space Layout Randomization (ASLR) must be enabled.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-080120 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others. (Intel)DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-080130 - The system must require passwords to change the boot device settings. (SPARC)DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-090040 - The system must not have any unnecessary accounts.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-100010 - The /etc/zones directory, and its contents, must have the vendor default owner, group, and permissions.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000175 - Splunk Enterprise forwarders must be configured with Indexer Acknowledgement enabled.DISA STIG Splunk Enterprise 7.x for Windows v3r1 OSWindows

CONFIGURATION MANAGEMENT

UBTU-16-010920 - The Ubuntu operating system must use a separate file system for /var.DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

UBTU-16-030520 - For Ubuntu operating systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured - nameserver 1DISA STIG Ubuntu 16.04 LTS v2r3Unix

CONFIGURATION MANAGEMENT

VMCH-65-000001 - Copy operations must be disabled on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000015 - The unexposed feature keyword isolation.ghi.host.shellAction.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000020 - The unexposed feature keyword isolation.tools.unityInterlockOperation.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000022 - The unexposed feature keyword isolation.tools.unity.taskbar.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-65-000023 - The unexposed feature keyword isolation.tools.unityActive.disable must be set on the virtual machine.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT