Item Search

NameAudit NamePluginCategory
AIOS-15-007300 - Apple iOS/iPadOS 15 allow list must be configured to not include applications with the following characteristics: voice dialing application if available when MD is locked.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-010400 - Apple iOS/iPadOS 15 must require a valid password be successfully entered before the mobile device data is unencrypted.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-010400 - Apple iOS/iPadOS 15 must require a valid password be successfully entered before the mobile device data is unencrypted.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-010500 - Apple iOS/iPadOS 15 must implement the management setting: limit Ad Tracking.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-010900 - Apple iOS/iPadOS 15 must implement the management setting: require the user to enter a password when connecting to an AirPlay-enabled device for the first time.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011300 - Apple iOS/iPadOS 15 must implement the management setting: use SSL for Exchange ActiveSync.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011800 - Apple iOS/iPadOS 15 must implement the management setting: force Apple Watch wrist detection.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012400 - Apple iOS/iPadOS 15 must not allow unmanaged apps to read contacts from managed contacts accounts.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012700 - Apple iOS/iPadOS 15 must disable Password AutoFill in browsers and applications.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012800 - Apple iOS/iPadOS 15 must disable allow setting up new nearby devices.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-012900 - Apple iOS/iPadOS 15 must disable password proximity requests.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-013400 - The Apple iOS must be configured to disable automatic transfer of diagnostic data to an external device other than an MDM service with which the device has enrolled.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-999999 - All Apple iOS/iPadOS 15 installations must be removed.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-16-007200 - Apple iOS/iPadOS 16 must not include applications with the following characteristics: access to Siri when the device is locked.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-007300 - Apple iOS/iPadOS 16 allow list must be configured to not include applications with the following characteristics: allow voice dialing when MD is locked.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-706600 - Apple iOS/iPadOS 16 must be configured to not allow passwords that include more than four repeating or sequential characters.AirWatch - DISA Apple iOS/iPadOS 16 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-16-707000 - Apple iOS/iPadOS 16 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].AirWatch - DISA Apple iOS/iPadOS 16 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-007400 - Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics: - backs up MD data to non-DOD cloud servers (including user and application access to cloud backup services);- transmits MD diagnostic data to non-DOD servers;- allows synchronization of data or applications between devices associated with user; and- allows unencrypted (or encrypted but not FIPS 140-2/FIPS 140-3 validated) data sharing with other MDs or printers - allows unencrypted (or encrypted but not FIPS 140-2 validated) data sharing with other MDs or printers.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-012300 - Apple iOS/iPadOS 17 must not allow managed apps to write contacts to unmanaged contacts accounts.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-013500 - Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DOD security requirements.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-707400 - Apple iOS/iPadOS 17 allow list must be configured to not include applications with the following characteristics:AirWatch - DISA Apple iOS/iPadOS 17 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-712300 - Apple iOS/iPadOS 17 must not allow managed apps to write contacts to unmanaged contacts accounts.AirWatch - DISA Apple iOS/iPadOS 17 BYOAD v1r1MDM

CONFIGURATION MANAGEMENT

AIX7-00-002092 - The inetd.conf file on AIX must be group owned by the 'system' group.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002093 - The AIX /etc/inetd.conf file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002141 - The AIX /etc/hosts file must be group-owned by system.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002149 - The AIX /var/spool/cron/atjobs directory must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Access Control ListsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-004021 - The macOS system must be configured with the sudoers file configured to authenticate users on a per -tty basis.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-004021 - The macOS system must be configured with the sudoers file configured to authenticate users on a per -tty basis.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-005050 - The macOS Application Firewall must be enabled - EnableStealthModeDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-005051 - The macOS system must restrict the ability of individuals to use USB storage devices.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

PHTN-30-000073 - The Photon operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000082 - The Photon operating system must configure sshd to disallow Kerberos authentication.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000095 - The Photon operating system must be configured so the '/etc/cron.allow' file is protected from unauthorized modification.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000103 - The Photon operating system must log IPv4 packets with impossible addresses.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000111 - The Photon operating system must protect all boot configuration files from unauthorized modification.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000119 - The Photon operating system must configure sshd to restrict AllowTcpForwarding.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

PHTN-30-000120 - The Photon operating system must configure sshd to restrict LoginGraceTime.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

CONFIGURATION MANAGEMENT

UBTU-24-100020 - Ubuntu 24.04 LTS must not have the "ntp" package installed.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-100700 - Ubuntu 24.04 LTS must have the "chrony" package installed.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300025 - Ubuntu 24.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300030 - Ubuntu 24.04 LTS default filesystem permissions must be defined in such a way that all authenticated users can read and modify only their own files.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

UBTU-24-300031 - Ubuntu 24.04 LTS must not allow unattended or automatic login via SSH.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

CONFIGURATION MANAGEMENT

VCSA-80-000268 - The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000273 - The vCenter Server must not configure VLAN Trunking unless Virtual Guest Tagging (VGT) is required and authorized.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000276 - The vCenter Server must configure the "vpxuser" password to meet length policy.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000290 - The vCenter Server must limit membership to the "SystemConfiguration.BashShellAdministrators" Single Sign-On (SSO) group.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000291 - The vCenter Server must limit membership to the "TrustedAdmins" Single Sign-On (SSO) group.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000300 - The vCenter Server must remove unauthorized port mirroring sessions on distributed switches.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000301 - The vCenter Server must not override port group settings at the port level on distributed switches.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT