Item Search

NameAudit NamePluginCategory
CISC-RT-000237 - The Cisco router must not be configured to use IPv6 Site Local Unicast addresses.DISA Cisco IOS Router RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

JUEX-L2-000230 - The Juniper EX switch must be configured to set all enabled user-facing or untrusted ports as access interfaces.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-NM-000680 - The Juniper EX switch must be configured with an operating system release that is currently supported by the vendor.DISA Juniper EX Series Network Device Management v2r3Juniper

CONFIGURATION MANAGEMENT

OL08-00-010010 - OL 8 vendor-packaged system security patches and updates must be installed and up to date.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010292 - The OL 8 SSH server must be configured to use strong entropy.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010521 - The OL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010522 - The OL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010570 - OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010580 - OL 8 must prevent special devices on non-root local partitions.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010600 - OL 8 file systems must not interpret character or block special devices from untrusted file systems.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010620 - OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010640 - OL 8 file systems must not interpret character or block special devices that are imported via NFS.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010650 - OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010675 - OL 8 must disable core dump backtraces.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010700 - All OL 8 world-writable directories must be owned by root, sys, bin, or an application user.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010710 - All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010750 - All OL 8 local interactive user home directories defined in the "/etc/passwd" file must exist.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-010800 - A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-020103 - OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-020300 - OL 8 must prevent the use of dictionary words for passwords.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-020320 - OL 8 must not have unnecessary accounts.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-020330 - OL 8 must not allow accounts configured with blank or null passwords.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-020352 - OL 8 must set the umask value to 077 for all local interactive user accounts.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040180 - OL 8 must disable the debug-shell systemd service.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040249 - OL 8 must not forward IPv4 source-routed packets by default.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040262 - OL 8 must not accept router advertisements on all IPv6 interfaces by default.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040279 - OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040284 - OL 8 must disable the use of user namespaces.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

OL08-00-040321 - The graphical display manager must not be the default target on OL 8 unless approved.DISA Oracle Linux 8 STIG v2r4Unix

CONFIGURATION MANAGEMENT

RHEL-08-010522 - The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010570 - RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010590 - RHEL 8 must prevent code from being executed on file systems that contain user home directories.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010673 - RHEL 8 must disable core dumps for all users.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-010674 - RHEL 8 must disable storing core dumps.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000280 - Splunk Enterprise must be configured with a report to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

CONFIGURATION MANAGEMENT

SPLK-CL-000290 - Analysis, viewing, and indexing functions, services, and applications used as part of Splunk Enterprise must be configured to comply with DoD-trusted path and access requirements.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

CONFIGURATION MANAGEMENT

UBTU-18-010418 - The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-18-010452 - All local interactive user home directories must be group-owned by the home directory owners primary group.DISA STIG Ubuntu 18.04 LTS v2r15Unix

CONFIGURATION MANAGEMENT

UBTU-20-010047 - The Ubuntu operating system must not allow unattended or automatic login via SSH.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-20-010048 - The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-20-010454 - The Ubuntu operating system must have an application firewall enabled.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-20-010463 - The Ubuntu operating system must not allow accounts configured with blank or null passwords.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-22-271030 - Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

CONFIGURATION MANAGEMENT

WN22-CC-000260 - Windows Server 2022 Windows Update must not obtain updates from other PCs on the internet.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-MS-000140 - Windows Server 2022 must be running Credential Guard on domain-joined member servers.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-SO-000020 - Windows Server 2022 must prevent local accounts with blank passwords from being used from the network.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-SO-000210 - Windows Server 2022 must not allow anonymous SID/Name translation.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-SO-000280 - Windows Server 2022 must prevent PKU2U authentication using online identities.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-SO-000340 - Windows Server 2022 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-UC-000010 - Windows Server 2022 must preserve zone information when saving attachments.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT