Item Search

NameAudit NamePluginCategory
APPL-15-002068 - The macOS system must secure users' home folders.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

CONFIGURATION MANAGEMENT

APPL-15-003013 - The macOS system must enable firmware password.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

CONFIGURATION MANAGEMENT

APPL-15-005110 - The macOS system must enforce enrollment in Mobile Device Management (MDM).DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

CONFIGURATION MANAGEMENT

ESXI-70-000002 - The ESXi host must verify the DCUI.Access list.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000054 - The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000063 - All port groups on standard switches must be configured to a value other than that of the native virtual local area network (VLAN).DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000064 - All port groups on standard switches must not be configured to virtual local area network (VLAN) 4095 unless Virtual Guest Tagging (VGT) is required.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000070 - The ESXi host must not provide root/administrator-level access to Common Information Model (CIM)-based hardware monitoring tools or other third-party applications.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000078 - The ESXi host must use DOD-approved certificates.DISA STIG VMware vSphere 7.0 ESXi OS v1r4Unix

CONFIGURATION MANAGEMENT

ESXI-70-000079 - The ESXi host must not suppress warnings that the local or remote shell sessions are enabled.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000087 - The ESXi host must enable volatile key destruction.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000089 - The ESXi Host Client must be configured with a session timeout.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000092 - The ESXi host must not be configured to override virtual machine (VM) configurations.DISA STIG VMware vSphere 7.0 ESXi OS v1r4Unix

CONFIGURATION MANAGEMENT

ESXI-80-000189 - The ESXi host DCUI.Access list must be verified.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000210 - The ESXi host Secure Shell (SSH) daemon must set a timeout count on idle sessions.DISA VMware vSphere 8.0 ESXi STIG v2r3Unix

CONFIGURATION MANAGEMENT

ESXI-80-000212 - The ESXi host must disable Simple Network Management Protocol (SNMP) v1 and v2c.DISA VMware vSphere 8.0 ESXi STIG v2r3Unix

CONFIGURATION MANAGEMENT

ESXI-80-000215 - The ESXi host must enable Bridge Protocol Data Units (BPDU) filter on the host to prevent being locked out of physical switch ports with Portfast and BPDU Guard enabled.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000224 - The ESXi host must verify certificates for SSL syslog endpoints.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000231 - The ESXi host OpenSLP service must be disabled.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000236 - The ESXi host must not be configured to override virtual machine (VM) configurations.DISA VMware vSphere 8.0 ESXi STIG v2r3Unix

CONFIGURATION MANAGEMENT

ESXI-80-000240 - The ESXi host when using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

ESXI-80-000250 - The ESXi host must disable virtual hardware management network interfaces.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

GOOG-15-006500 - Google Android 15 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-006500 - Google Android 15 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-006500 - Google Android 15 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-009900 - Google Android 15 must be configured to disable Wi-Fi Sharing.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-009900 - Google Android 15 must be configured to disable Wi-Fi Sharing.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-009950 - Google Android 15 must be configured to enforce a password for Wi-Fi and Bluetooth hotspot, if approved for use by the authorizing official (AO). If not approved for use, Wi-Fi and Bluetooth hotspot must be disabled.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010000 - Google Android 15 must have the DOD root and intermediate PKI certificates installed.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010000 - Google Android 15 must have the DOD root and intermediate PKI certificates installed.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010000 - Google Android 15 must have the DOD root and intermediate PKI certificates installed.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010000 - Google Android 15 must have the DOD root and intermediate PKI certificates installed.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010200 - The Google Android 15 work profile must be configured to enforce the system application disable list.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010200 - The Google Android 15 work profile must be configured to enforce the system application disable list.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010200 - The Google Android 15 work profile must be configured to enforce the system application disable list.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010800 - Android 15 devices must have the latest available Google Android 15 operating system installed.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010800 - Android 15 devices must have the latest available Google Android 15 operating system installed.AirWatch - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-010900 - Android 15 devices must be configured to disable the use of third-party keyboards.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-011000 - Android 15 devices must be configured to enable Common Criteria (CC) Mode - CC Mode.MobileIron - DISA Google Android 15 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-011000 - Android 15 devices must be configured to enable Common Criteria Mode (CC Mode) - CC Mode.AirWatch - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-15-011000 - Android 15 devices must be configured to enable Common Criteria Mode (CC Mode) - CC Mode.MobileIron - DISA Google Android 15 COBO v1r2MDM

CONFIGURATION MANAGEMENT

O19C-00-009900 - The Oracle Listener must be configured to require administration authentication.DISA Oracle Database 19c STIG v1r1 WindowsWindows

CONFIGURATION MANAGEMENT

O19C-00-010000 - Application role permissions must not be assigned to the Oracle PUBLIC role.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010400 - The directories assigned to the LOG_ARCHIVE_DEST* parameters must be protected from unauthorized access.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010500 - The Oracle _TRACE_FILES_PUBLIC parameter if present must be set to FALSE.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-010800 - The Oracle Database data files, transaction logs and audit files must be stored in dedicated directories or disk partitions separate from software or other application files.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O19C-00-011500 - The /diag subdirectory under the directory assigned to the DIAGNOSTIC_DEST parameter must be protected from unauthorized access.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

OL07-00-020231 - The Oracle Linux operating system must be configured so the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.DISA Oracle Linux 7 STIG v3r2Unix

CONFIGURATION MANAGEMENT

WN22-00-000040 - Windows Server 2022 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000250 - Windows Server 2022 Diagnostic Data must be configured to send 'required diagnostic data' or 'optional diagnostic data'.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT