Item Search

NameAudit NamePluginCategory
AIOS-18-003300 - Apple iOS/iPadOS 18 must not allow backup to remote systems (iCloud Keychain) - iCloud Keychain.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-007000 - Apple iOS/iPadOS 18 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, MDM server, mobile application store].AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-012650 - Apple iOS/iPadOS 18 must implement the management setting: approved Apple Watches must be managed by an MDM.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-013300 - Apple iOS/iPadOS 18 must disable 'Allow USB drive access in Files app' if the authorizing official (AO) has not approved the use of DOD-approved USB storage drives with iOS/iPadOS devices - Allow USB drive access in Files app if the Authorizing Official (AO) has not approved the use of DoD-approved USB storage drives with iOS/iPadOSAirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-18-013500 - Apple iOS must implement the management setting: not allow a user to remove Apple iOS configuration profiles that enforce DOD security requirements.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-014400 - Apple iOS/iPadOS 18 must disable connections to Siri servers for the purpose of dictation.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-014600 - Apple iOS/iPadOS 18 must disable copy/paste of data from managed to unmanaged applications.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-014900 - Apple iOS/iPadOS 18 must disable the installation of alternative marketplace apps.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-016400 - Apple iOS/iPadOS 18 must disable automatic downloads of apps purchased on other Apple devices.AirWatch - DISA Apple iOS/iPadOS 18 v1r4MDM

CONFIGURATION MANAGEMENT

CNTR-K8-003340 - The Kubernetes PKI keys must have file permissions set to 600 or more restrictive.DISA STIG Kubernetes v2r3Unix

CONFIGURATION MANAGEMENT

JUEX-L2-000070 - The Juniper EX switch must be configured to authenticate all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUEX-L2-000090 - The Juniper EX switch must be configured to enable BPDU Protection on all user-facing or untrusted access switch ports.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000170 - If STP is used, the Juniper EX switch must be configured to implement Rapid STP, or Multiple STP, where VLANs span multiple switches with redundant links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-L2-000220 - The Juniper EX switch must not use the default VLAN for management traffic.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000240 - The Juniper EX switch must not have a native VLAN ID assigned, or have a unique native VLAN ID, for all 802.1q trunk links.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

CONFIGURATION MANAGEMENT

JUEX-NM-000130 - The Juniper EX switch must be configured to produce audit records containing information to establish when (date and time) the events occurred.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000140 - The Juniper EX switch must be configured to produce audit records containing information to establish where the events occurred.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000170 - The Juniper EX switch must be configured to generate audit records containing information that establishes the identity of any individual or process associated with the event.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

JUEX-NM-000580 - The Juniper EX switch must be configured to generate audit records showing starting and ending time for administrator access to the system.DISA Juniper EX Series Network Device Management v2r3Juniper

AUDIT AND ACCOUNTABILITY

SPLK-CL-000130 - Splunk Enterprise must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

AUDIT AND ACCOUNTABILITY

WN19-DC-000391 - Windows Server 2019 must be configured for certificate-based authentication for domain controllers.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-DC-000401 - Windows Server 2019 must be configured for named-based strong mappings for certificates.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN22-00-000070 - Windows Server 2022 shared user accounts must not be permitted.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000290 - Windows Server 2022 must employ automated mechanisms to determine the state of system components with regard to flaw remediation using the following frequency: continuously, where Endpoint Security Solution (ESS) is used; 30 days, for any additional internal network scans not covered by ESS; and annually, for external scans by Computer Network Defense Service Provider (CNDSP).DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000320 - Windows Server 2022 must not have the Fax Server role installed.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000380 - Windows Server 2022 must not the Server Message Block (SMB) v1 protocol installed.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000390 - Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000400 - Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000420 - Windows Server 2022 FTP servers must be configured to prevent anonymous logons.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000430 - Windows Server 2022 FTP servers must be configured to prevent access to the system drive.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000450 - Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-AU-000070 - Windows Server 2022 must be configured to audit Account Logon - Credential Validation successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

AUDIT AND ACCOUNTABILITY

WN22-AU-000240 - Windows Server 2022 must be configured to audit Object Access - Removable Storage successes.DISA Microsoft Windows Server 2022 STIG v2r4Windows

AUDIT AND ACCOUNTABILITY

WN22-CC-000020 - Windows Server 2022 must have WDigest Authentication disabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000070 - Windows Server 2022 insecure logons to an SMB server must be disabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000130 - Windows Server 2022 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000140 - Windows Server 2022 group policy objects must be reprocessed even if they have not changed.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000170 - Windows Server 2022 network selection user interface (UI) must not be displayed on the logon screen.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000310 - Windows Server 2022 Explorer Data Execution Prevention must be enabled.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WN22-CC-000360 - Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-CC-000410 - Windows Server 2022 must prevent Indexing of encrypted files.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-DC-000120 - Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-DC-000130 - Windows Server 2022 domain controllers must run on a machine dedicated to that function.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-DC-000380 - Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000406 - Windows Server 2022 must be configured for name-based strong mappings for certificates.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000430 - The password for the krbtgt account on a domain must be reset at least every 180 days.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-MS-000100 - Windows Server 2022 Deny log on as a service user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts. No other groups or accounts must be assigned this right.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-SO-000100 - Windows Server 2022 maximum age for machine account passwords must be configured to 30 days or less.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-SO-000260 - Windows Server 2022 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-SO-000400 - Windows Server 2022 User Account Control (UAC) must, at a minimum, prompt administrators for consent on the secure desktop.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION