Item Search

NameAudit NamePluginCategory
2.1.3 Ensure dhcp server services are not in useCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

2.1.3 Ensure dhcp server services are not in useCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.1.3 Ensure dhcp server services are not in useCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.3 Ensure dhcp server services are not in useCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

2.2.3 Ensure dhcp server services are not in useCIS Oracle Linux 8 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.2.3 Ensure dhcp server services are not in useCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

20.62 Ensure 'Telnet Client is not installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.64 Ensure 'TFTP Client' is 'not installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.64 Ensure 'TFTP Client' is 'not installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

ESXI-06-000030 - The system must produce audit records containing information to establish what type of events occurred.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

AUDIT AND ACCOUNTABILITY

ESXI-06-000031 - The VMM must enforce password complexity by requiring that at least one upper-case character be used.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-000034 - The system must disable the Managed Object Browser (MOB).DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000046 - The system must configure NTP time synchronization.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

AUDIT AND ACCOUNTABILITY

ESXI-06-000051 - The system must protect the confidentiality and integrity of transmitted information.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000052 - The system must protect the confidentiality and integrity of transmitted information by utilizing different TCP/IP stacks where possible.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000057 - The system must configure the firewall to block network traffic by default - OutgoingDISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000061 - The virtual switch Promiscuous Mode policy must be set to reject.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000062 - The system must prevent unintended use of the dvFilter network APIs.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000070 - The system must not provide root/administrator level access to CIM-based hardware monitoring tools or other third-party applications.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000076 - The system must configure the VSAN Datastore name to a unique name.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-100030 - The VMM must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

AUDIT AND ACCOUNTABILITY

ESXI-06-100041 - The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown by setting an idle timeout.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

ACCESS CONTROL

ESXI-06-100042 - The VMM must automatically terminate a user session after inactivity timeouts have expired or at shutdown by setting an idle timeout on shell services.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

ACCESS CONTROL

ESXI-06-200035 - The VMM must provide the capability to immediately disconnect or disable remote access to the information system by disabling SSH.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

ACCESS CONTROL

ESXI-06-300039 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by restricting use of Active Directory ESX Admin group membership.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-65-000034 - The ESXi host must disable the Managed Object Browser (MOB).DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

GOOG-11-000100 - Google Android 11 must be configured to enforce a minimum password length of six characters.MobileIron - DISA Google Android 11 COPE v2r1MDM

IDENTIFICATION AND AUTHENTICATION

MSFT-11-000100 - Microsoft Android 11 must be configured to enforce a minimum password length of six characters.MobileIron - DISA Microsoft Android 11 COBO v1r2MDM

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000019 - There must be no .rhosts or hosts.equiv files on the system.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000020 - The system must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000029 - Default operating system accounts, other than root, must be locked.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000032 - The root account must be the only account having a UID of 0.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000033 - The /etc/shadow file must be owned by root.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000040 - The /etc/passwd file must be group-owned by root.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000044 - The /etc/group file must have mode 0644 or less permissive.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000045 - Library files must have mode 0755 or less permissive - '/usr/lib64/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/lib64/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000046 - Library files must be owned by a system account - '/usr/local/lib64/*'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000047 - All system command files must have mode 755 or less permissive - '/usr/local/sbin/*'DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000048 - All system command files must be owned by root - /sbin/*.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000048 - All system command files must be owned by root - /usr/sbin/*.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000054 - Users must be warned 7 days in advance of password expiration.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000056 - The system must require passwords to contain at least one numeric character - system-auth.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000062 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes (system-auth) - system-auth.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000070 - The system must not permit interactive boot.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-06-000079 - The system must limit the ability of processes to have simultaneous write and execute access to memory - sysctlDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000081 - The system must not send ICMPv4 redirects from any interface - configDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000083 - The system must not accept IPv4 source-routed packets on any interface - sysctlDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000084 - The system must not accept ICMPv4 redirect packets on any interface - configDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000086 - The system must not accept ICMPv4 secure redirect packets on any interface - sysctlDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT