Item Search

NameAudit NamePluginCategory
1.1.4.1.3 Ensure 'Consistent Mime Handling' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

1.76 (L2) Ensure 'Control where security restrictions on insecure origins apply' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L2Windows

CONFIGURATION MANAGEMENT

2.3 Ensure Managed Object Browser (MOB) is disabledCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

ACCESS CONTROL, MEDIA PROTECTION

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

11.4 Ensure Only the Necessary SELinux Booleans Are EnabledCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND INFORMATION INTEGRITY

11.4 Ensure Only the Necessary SELinux Booleans Are EnabledCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

Access Security - Disable insecure or unnecessary access services (telnet, J-Web over HTTP, FTP, etc.) - tftp-serverJuniper Hardening JunOS 12 Devices ChecklistJuniper

CONFIGURATION MANAGEMENT

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connectDISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed connectDISA STIG Apache Server 2.4 Windows Server v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000530 - The Apache web server must generate unique session identifiers with definable entropy - SSLRandomSeed startupDISA STIG Apache Server 2.4 Windows Server v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Directory access permissions should be restricted.TNS IBM HTTP Server Best PracticeWindows

ACCESS CONTROL

DTBI515-IE11 - Websites in less privileged web content zones must be prevented from navigating into the Internet zone.DISA STIG IE 11 v2r5Windows

ACCESS CONTROL

DTOO177 - Office System - Access to updates, add-ins, and patches on Office.com must be disabled.DISA STIG Office System 2010 v1r13Windows

CONFIGURATION MANAGEMENT

EX13-CA-000150 - Exchange OWA must use https - InternalDISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JBOS-AS-000015 - HTTPS must be enabled for JBoss web interfaces.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

JBOS-AS-000470 - Network access to HTTP management must be disabled on domain-enabled application servers not designated as the domain controller.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

OH12-1X-000194 - OHS must be set to evaluate deny directives first when considering whether to serve a file.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000195 - OHS must deny all access by default when considering whether to serve a file.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000221 - A private OHS list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000281 - OHS must have the DocumentRoot directive set to a separate partition from the OHS system files.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000282 - OHS must have the Directory directive accompanying the DocumentRoot directive set to a separate partition from the OHS system files.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SHPT-00-000127 - The 'Automatically delete the site collection if use is not confirmed' property must not be enabled for web applications.DISA STIG SharePoint 2010 v1r9Windows

CONFIGURATION MANAGEMENT

SHPT-00-000130 - For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed must not be installed in the DMZ.DISA STIG SharePoint 2010 v1r9Windows

ACCESS CONTROL

SP13-00-000155 - For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.DISA STIG SharePoint 2013 v2r4Windows

ACCESS CONTROL

SYMP-AG-000120 - Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur - enabledDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

SYMP-AG-000120 - Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful logon attempts occur - policy rulesDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

SYMP-NM-000190 - Symantec ProxySG must support organizational requirements to conduct backups of system level information contained in the ProxySG when changes occur or weekly, whichever is sooner - PathDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

SYMP-NM-000190 - Symantec ProxySG must support organizational requirements to conduct backups of system level information contained in the ProxySG when changes occur or weekly, whichever is sooner - UsernameDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

SYMP-NM-000190 - Symantec ProxySG must support organizational requirements to conduct backups of system level information contained in the ProxySG when changes occur or weekly, whichever is sooner.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

Timeout value parameter value should be appropriately configuredTNS IBM HTTP Server Best PracticeUnix

ACCESS CONTROL

Timeout value parameter value should be appropriately configuredTNS IBM HTTP Server Best Practice MiddlewareUnix

ACCESS CONTROL

Timeout value parameter value should be appropriately configuredTNS IBM HTTP Server Best PracticeWindows

ACCESS CONTROL

VCLD-67-000020 - VAMI must have resource mappings set to disable the serving of certain file types.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

CONFIGURATION MANAGEMENT

VCLD-80-000033 The vCenter VAMI service must have resource mappings set to disable the serving of certain file types.DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1Unix

CONFIGURATION MANAGEMENT

VCWN-06-000012 - The system must disable the distributed virtual switch health check.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000018 - All port groups must be configured to a value other than that of the native VLAN.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000020 - All port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000012 - The vCenter Server for Windows must disable the distributed virtual switch health check.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000013 - The vCenter Server for Windows must set the distributed port group Forged Transmits policy to reject.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000015 - The vCenter Server for Windows must set the distributed port group Promiscuous Mode policy to reject.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VMCH-67-000009 - Unauthorized CD/DVD devices must be disconnected on the virtual machine.DISA STIG VMware vSphere 6.7 Virtual Machine v1r3VMware

CONFIGURATION MANAGEMENT

WA000-WI030 IIS6 - The IUSR_machinename account must not have read access to the .inc files or their equivalent. - '.asa'DISA STIG IIS 6.0 Site Checklist v6r16Windows

ACCESS CONTROL

WA000-WI030 IIS6 - The IUSR_machinename account must not have read access to the .inc files or their equivalent. - '.asax'DISA STIG IIS 6.0 Site Checklist v6r16Windows

ACCESS CONTROL

WA000-WI030 IIS6 - The IUSR_machinename account must not have read access to the .inc files or their equivalent. - '.inc'DISA STIG IIS 6.0 Site Checklist v6r16Windows

ACCESS CONTROL

WA00540 A22 - The web server must be configured to explicitly deny access to the OS root - DenyDISA STIG Apache Server 2.2 Unix v1r11Unix

ACCESS CONTROL

WA00540 A22 - The web server must be configured to explicitly deny access to the OS root - DenyDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WA00540 A22 - The web server must be configured to explicitly deny access to the OS root - OrderDISA STIG Apache Server 2.2 Unix v1r11Unix

ACCESS CONTROL

WA00540 A22 - The web server must be configured to explicitly deny access to the OS root - OrderDISA STIG Apache Server 2.2 Unix v1r11 MiddlewareUnix
WG355 W22 - A private web server's list of CAs in a trust hierarchy must lead to an authorized DoD PKI Root CA.DISA STIG Apache Server 2.2 Windows v1r13Windows