Item Search

NameAudit NamePluginCategory
FFOX-00-000005 - Firefox must be configured to not automatically update installed add-ons and plugins.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000007 - Firefox must be configured to disable form fill assistance.DISA STIG Mozilla Firefox Linux v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000008 - Firefox must be configured to not use a password store with or without a master password.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000017 - Firefox must be configured to not delete data upon shutdown.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000024 - Firefox cryptomining protection must be enabled.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000025 - Firefox Enhanced Tracking Protection must be enabled.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000027 - Firefox deprecated ciphers must be disabled.DISA STIG Mozilla Firefox Linux v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000027 - Firefox deprecated ciphers must be disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000029 - The Firefox New Tab page must not show Top Sites, Sponsored Top Sites, Pocket Recommendations, Sponsored Pocket Stories, Searches, Highlights, or Snippets.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000033 - Firefox must be configured so that DNS over HTTPS is disabled.DISA STIG Mozilla Firefox Windows v6r6Windows

CONFIGURATION MANAGEMENT

FFOX-00-000036 - Firefox feedback reporting must be disabled.DISA STIG Mozilla Firefox Linux v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000036 - Firefox feedback reporting must be disabled.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

FFOX-00-000039 - Firefox Studies must be disabled.DISA STIG Mozilla Firefox MacOS v6r6Unix

CONFIGURATION MANAGEMENT

O19C-00-008600 - Oracle instance names must not contain Oracle version numbers.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-009000 - The Oracle WITH GRANT OPTION privilege must not be granted to nondatabase administrator (DBA) or nonapplication administrator user accounts.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-009300 - The Oracle SQL92_SECURITY parameter must be set to TRUE.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-009400 - The Oracle password file ownership and permissions should be limited and the REMOTE_LOGIN_PASSWORDFILE parameter must be set to EXCLUSIVE or NONE.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010100 - Oracle application administration roles must be disabled if not required and authorized.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011300 - Changes to configuration options must be audited.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011600 - Remote administration must be disabled for the Oracle connection manager.DISA Oracle Database 19c STIG v1r1 UnixUnix

CONFIGURATION MANAGEMENT

O19C-00-011600 - Remote administration must be disabled for the Oracle connection manager.DISA Oracle Database 19c STIG v1r1 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-013200 - OS accounts used to run external procedures called by Oracle Database must have limited privileges.DISA Oracle Database 19c STIG v1r1 UnixUnix

CONFIGURATION MANAGEMENT

O19C-00-020400 - Oracle Database must include only approved trust anchors in trust stores or certificate stores managed by the organization.DISA Oracle Database 19c STIG v1r1 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-411045 - All RHEL 9 interactive users must have a primary group that exists.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411105 - RHEL 9 must ensure account lockouts persist.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-412045 - RHEL 9 must log username information when unsuccessful logon attempts occur.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-412055 - RHEL 9 must define default permissions for the bash shell.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-412080 - RHEL 9 must terminate idle user sessions.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-432030 - RHEL 9 must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-611105 - RHEL 9 must prevent the use of dictionary words for passwords.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-611200 - RHEL 9 must require authentication to access single-user mode.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-652020 - The rsyslog service on RHEL 9 must be active.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-653105 - RHEL 9 must write audit records to disk.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-09-653125 - RHEL 9 must have mail aliases to notify the information system security officer (ISSO) and system administrator (SA) (at a minimum) in the event of an audit processing failure.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010123 - The Ubuntu operating system must be configured to permit only authorized users ownership of the audit log files.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010124 - The Ubuntu operating system must permit only authorized groups ownership of the audit log files.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010166 - The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the apparmor_parser command.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010168 - The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the chacl command.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010173 - The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the unix_update command.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010174 - The Ubuntu operating system must generate audit records for successful/unsuccessful uses of the gpasswd command.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010277 - The Ubuntu operating system must generate audit records for the /var/log/wtmp file.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010278 - The Ubuntu operating system must generate audit records for the /var/run/utmp file.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010298 - The Ubuntu operating system must generate audit records when successful/unsuccessful attempts to use the fdisk command.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010404 - The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-20-010407 - The Ubuntu operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-20-010411 - The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010421 - The Ubuntu operating system must configure /var/log/syslog file to be owned by syslog.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-20-010422 - The Ubuntu operating system must configure /var/log/syslog file with mode 0640 or less permissive.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-20-010423 - The Ubuntu operating system must have directories that contain system commands set to a mode of 0755 or less permissive.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010447 - The Ubuntu operating system must implement nonexecutable data to protect its memory from unauthorized code execution.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY