| EDGE-00-000008 - The ability of sites to show pop-ups must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000012 - Search suggestions must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000018 - Importing of home page settings must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000022 - Importing of search engine settings must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000028 - Autofill for Credit Cards must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000029 - Autofill for addresses must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000055 - A website's ability to query for payment methods must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000058 - The collections feature must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000065 - Visual Search must be disabled. | DISA STIG Edge v2r3 | Windows | CONFIGURATION MANAGEMENT |
| EDGE-00-000067 - Session only-based cookies must be enabled. | DISA STIG Edge v2r3 | Windows | AUDIT AND ACCOUNTABILITY |
| ESXI-80-000005 - The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | ACCESS CONTROL |
| ESXI-80-000160 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
| ESXI-80-000204 - The ESXi host Secure Shell (SSH) daemon must not permit user environment settings. | DISA VMware vSphere 8.0 ESXi STIG v2r3 Unix | Unix | CONFIGURATION MANAGEMENT |
| ESXI-80-000214 - The ESXi host must configure the firewall to block network traffic by default. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | CONFIGURATION MANAGEMENT |
| ESXI-80-000220 - The ESXi host must restrict the use of Virtual Guest Tagging (VGT) on standard switches. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | CONFIGURATION MANAGEMENT |
| ESXI-80-000226 - The ESXi host must configure a session timeout for the vSphere API. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | CONFIGURATION MANAGEMENT |
| ESXI-80-000236 - The ESXi host must not be configured to override virtual machine (VM) configurations. | DISA VMware vSphere 8.0 ESXi STIG v2r3 Unix | Unix | CONFIGURATION MANAGEMENT |
| ESXI-80-000244 - The ESXi host must enforce the exclusive running of executables from approved VIBs. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | CONFIGURATION MANAGEMENT |
| ESXI-80-000246 - The ESXi host must not enable log filtering. | DISA VMware vSphere 8.0 ESXi STIG v2r3 VMware | VMware | CONFIGURATION MANAGEMENT |
| UBTU-22-654090 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the ssh-agent command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654105 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the sudo command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654120 - Ubuntu 22.04 LTS must generate audit records for successful/unsuccessful uses of the unix_update command. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654190 - Ubuntu 22.04 LTS must generate audit records for all events that affect the systemd journal files. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | CONFIGURATION MANAGEMENT |
| UBTU-22-654200 - Ubuntu 22.04 LTS must generate audit records for the /var/log/wtmp file. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
| UBTU-22-654225 - Ubuntu 22.04 LTS must generate audit records when successful/unsuccessful attempts to modify the /etc/sudoers.d directory occur. | DISA Canonical Ubuntu 22.04 LTS STIG v2r5 | Unix | AUDIT AND ACCOUNTABILITY |
| VCLU-80-000134 The vCenter Lookup service shutdown port must be disabled. | DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
| WN16-CC-000555 - Windows Server 2016 must have PowerShell Transcription enabled. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | AUDIT AND ACCOUNTABILITY |
| WN19-CC-000530 - Windows Server 2019 must have PowerShell Transcription enabled. | DISA Microsoft Windows Server 2019 STIG v3r5 | Windows | AUDIT AND ACCOUNTABILITY |
| WN22-00-000040 - Windows Server 2022 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-00-000070 - Windows Server 2022 shared user accounts must not be permitted. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | IDENTIFICATION AND AUTHENTICATION |
| WN22-00-000240 - Windows Server 2022 must have software certificate installation files removed. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-00-000330 - Windows Server 2022 must not have the Microsoft FTP service installed unless required by the organization. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-00-000370 - Windows Server 2022 must not have the TFTP Client installed. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-00-000390 - Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-AC-000010 - Windows Server 2022 account lockout duration must be configured to 15 minutes or greater. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-AU-000170 - Windows Server 2022 must be configured to audit Logon/Logoff - Group Membership successes. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | AUDIT AND ACCOUNTABILITY |
| WN22-CC-000070 - Windows Server 2022 insecure logons to an SMB server must be disabled. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-CC-000080 - Windows Server 2022 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-CC-000140 - Windows Server 2022 group policy objects must be reprocessed even if they have not changed. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-CC-000280 - Windows Server 2022 Security event log size must be configured to 196608 KB or greater. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | AUDIT AND ACCOUNTABILITY |
| WN22-CC-000300 - Windows Server 2022 Microsoft Defender antivirus SmartScreen must be enabled. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-CC-000360 - Windows Server 2022 Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | IDENTIFICATION AND AUTHENTICATION |
| WN22-DC-000120 - Windows Server 2022 data files owned by users must be on a different logical partition from the directory server data files. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WN22-DC-000370 - Windows Server 2022 Deny access to this computer from the network user right on domain controllers must be configured to prevent unauthenticated access. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-DC-000406 - Windows Server 2022 must be configured for name-based strong mappings for certificates. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | ACCESS CONTROL |
| WN22-MS-000020 - Windows Server 2022 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WN22-SO-000280 - Windows Server 2022 must prevent PKU2U authentication using online identities. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | CONFIGURATION MANAGEMENT |
| WN22-SO-000360 - Windows Server 2022 must be configured to use FIPS-compliant algorithms for encryption, hashing, and signing. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WN22-SO-000390 - Windows Server 2022 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WN22-SO-000400 - Windows Server 2022 User Account Control (UAC) must, at a minimum, prompt administrators for consent on the secure desktop. | DISA Microsoft Windows Server 2022 STIG v2r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |