Item Search

NameAudit NamePluginCategory
APPL-12-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 12 v1r9Unix

ACCESS CONTROL

APPL-12-001029 - The macOS system must allocate audit record storage capacity to store at least one week's worth of audit records when audit records are not immediately sent to a central audit record storage facility.DISA STIG Apple macOS 12 v1r9Unix

AUDIT AND ACCOUNTABILITY

APPL-12-001044 - The macOS system must generate audit records for DoD-defined events such as successful/unsuccessful logon attempts, successful/unsuccessful direct access attempts, starting and ending time for user access, and concurrent logons to the same account from different sources.DISA STIG Apple macOS 12 v1r9Unix

AUDIT AND ACCOUNTABILITY

APPL-12-002037 - The macOS system must be configured to disable the Cloud Storage Setup services.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-12-002060 - The macOS system must allow only applications that have a valid digital signature to run.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-12-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-12-005060 - The macOS system must be configured to prevent password proximity sharing requests from nearby Apple Devices.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

ARST-L2-000140 - The Arista MLS layer 2 Arista MLS switch must implement Rapid STP where VLANs span multiple switches with redundant links.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-L2-000210 - The Arista MLS layer 2 switch must have all user-facing or untrusted ports configured as access switch ports.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000030 - The Arista BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000050 - The Arista BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000200 - The out-of-band management (OOBM) Arista gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000410 - The Arista router must be configured with Unicast Reverse Path Forwarding (uRPF) loose mode enabled on all CE-facing interfaces.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000650 - The Arista perimeter router must be configured to block all outbound management traffic.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000720 - The MPLS router must be configured to have TTL propagation disabled.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONFIGURATION MANAGEMENT

CASA-FW-000020 - The Cisco ASA must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.DISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

CASA-FW-000040 - The Cisco ASA must be configured to generate traffic log entries containing information to establish what type of events occurred - Log ParametersDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000040 - The Cisco ASA must be configured to generate traffic log entries containing information to establish what type of events occurred - Logging EnabledDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000090 - The Cisco ASA must be configured to queue log records locally in the event that the central audit server is down or not reachable - Buffer EnabledDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000130 - The Cisco ASA must be configured to disable or remove unnecessary network services and functions that are not used as part of its role in the architecture - HTTPDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

CASA-FW-000130 - The Cisco ASA must be configured to disable or remove unnecessary network services and functions that are not used as part of its role in the architecture - TelnetDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

ESXI-65-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

KNOX-07-003700 - The Samsung Android 7 with Knox must be configured to disable developer modes.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-004500 - The Samsung Android 7 with Knox must be configured to disable USB mass storage mode.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012100 - The Samsung Android 7 with Knox must implement the management setting: Enable CC mode.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012300 - The Samsung Android 7 with Knox must implement the management setting: Install DoD root and intermediate PKI certificates.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012500 - The Samsung Android 7 with Knox must implement the management setting: Configure application install blacklist.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012900 - The Samsung Android 7 with Knox must implement the management setting: Disable Admin Remove.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-014300 - The Samsung Android 7 with Knox must implement the management setting: Container Account whitelist.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-018600 - The Samsung Android 7 with Knox must implement the management setting: Configure minimum password complexity.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-019000 - Samsung Android 7 mobile device users must complete required training.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-019200 - The Samsung Android 7 with Knox platform must implement the management setting: Disable Samsung WiFi Sharing.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913300 - The Samsung must implement the management setting: Disable sharing of calendar information outside the Container.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913600 - The Samsung must implement the management setting: Disable sharing of notification details outside the Container.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913700 - The Samsung Android 7 with Knox must implement the management setting: Configure Container application install blacklist.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913800 - The Samsung Android 7 with Knox must implement the management setting: Disable Move Applications to Container.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914100 - The Samsung Android 7 with Knox must implement the management setting: Configure Container application disable list.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914200 - The Samsung must implement the management setting: Disable automatic completion of Container browser text input.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

VCSA-70-000145 - The vCenter Server must set the interval for counting failed login attempts to at least 15 minutes.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

ACCESS CONTROL

VCSA-70-000273 - The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCST-70-000018 - The Security Token Service must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCST-70-000020 - The Security Token Service must set 'URIEncoding' to UTF-8.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCST-70-000021 - The Security Token Service must use the 'setCharacterEncodingFilter' filter. - filterDISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCST-70-000021 - The Security Token Service must use the 'setCharacterEncodingFilter' filter. - filter-mappingDISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCST-70-000024 - The Security Token Service must be configured to not show error reports.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCST-70-000029 - The Security Token Service must disable the shutdown port.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCST-70-000031 - The Security Token Service default servlet must be set to 'readonly'.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

CONFIGURATION MANAGEMENT

VCUI-70-000012 - vSphere UI must have Multipurpose Internet Mail Extensions (MIME) that invoke operating system shell programs disabled.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

CONFIGURATION MANAGEMENT

VCUI-70-000021 - vSphere UI must set URIEncoding to UTF-8.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCUI-70-000025 - vSphere UI must be configured to show error pages with minimal information.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND INFORMATION INTEGRITY