Item Search

NameAudit NamePluginCategory
DISA_F5_BIG-IP_AFM_v2r2.audit from DISA F5 BIG-IP Advanced Firewall Manager v2r2 STIGDISA F5 BIG-IP Advanced Firewall Manager STIG v2r2F5
DISA_F5_BIG-IP_Device_Management_v2r4.audit from DISA F5 BIG-IP Device Management v2r4 STIGDISA F5 BIG-IP Device Management STIG v2r4F5
DISA_F5_BIG-IP_LTM_v2r4.audit from DISA F5 BIG-IP Local Traffic Manager v2r4 STIGDISA F5 BIG-IP Local Traffic Manager STIG v2r4F5
DISA_STIG_Apache_Server-2.4_Windows_v3r3.audit from DISA Apache Server 2.4 Windows Server v3r3 STIGDISA STIG Apache Server 2.4 Windows Server v3r3Windows
DISA_STIG_Microsoft_Project_2016_v1r1.audit for Microsoft Project 2016, from DISA STIG Microsoft Project 2016 v1r1DISA STIG Microsoft Project 2016 v1r1Windows
DISA_STIG_MSSQL_2016_Instance-OS_v3r4.audit from DISA MS SQL Server 2016 Instance v3r4 STIGDISA STIG SQL Server 2016 Instance OS Audit v3r4Windows
DISA_STIG_VMware_vSphere_6.7_VAMI-lighttpd_v1r3.audit from DISA VMware vSphere 6.7 VAMI-lighttpd v1r3 STIGDISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix
DISA_VMware_vSphere_8.0_vCenter_Appliance_Perfcharts_STIG_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance Perfcharts STIG v2r1Unix
EX19-ED-000122 - Active hyperlinks in messages from non .mil domains must be rendered unclickable.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

JRE8-UX-000030 - Oracle JRE 8 must have a deployment.properties file present.DISA STIG Oracle JRE 8 Unix v1r3Unix

CONFIGURATION MANAGEMENT

JRE8-WN-000060 - Oracle JRE 8 must default to the most secure built-in setting - deployment.security.level.lockedDISA STIG Oracle JRE 8 Windows v2r1Windows

CONFIGURATION MANAGEMENT

JRE8-WN-000110 - Oracle JRE 8 must prevent the download of prohibited mobile code - deployment.security.blacklist.checkDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-WN-000170 - Oracle JRE 8 must prompt the user for action prior to executing mobile code - deployment.insecure.jresDISA STIG Oracle JRE 8 Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000001 - The system must prohibit password reuse for a minimum of five generations.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000003 - The system must enforce a 60-day maximum password lifetime restriction.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000007 - The system must limit the effects of information-flooding types of Denial of Service (DoS) attacks.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000008 - The system must provide an immediate real-time alert to the SA and ISSO, at a minimum, of all audit failure events.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

AUDIT AND ACCOUNTABILITY

VCWN-06-000009 - The system must use Active Directory authentication.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000012 - The system must disable the distributed virtual switch health check.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000013 - The distributed port group Forged Transmits policy must be set to reject.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000014 - The system must ensure the distributed port group MAC Address Change policy is set to reject.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000017 - The system must not override port group settings at the port level on distributed switches.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000019 - All port groups must not be configured to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000020 - All port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000021 - The system must enable SSL for Network File Copy (NFC).DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000022 - The vCenter Server services must be ran using a service account instead of a built-in Windows account.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000023 - The system must ensure the vpxuser auto-password change meets policy.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000024 - The system must ensure the vpxuser password meets length policy.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000025 - The system must disable the managed object browser at all times, when not required for troubleshooting or maintenance.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000026 - Privilege re-assignment must be checked after the vCenter Server restarts.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000027 - The system must minimize access to the vCenter server.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000028 - Log files must be cleaned up after failed installations of the vCenter Server.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000029 - The system must enable all tasks to be shown to Administrators in the Web Client.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000030 - The vCenter Administrator role must be secured and assigned to specific users other than a Windows Administrator.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000031 - Connectivity between Update Manager and public patch repos restricted by use of a separate Update Manager Download Server.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000032 - A least-privileges assignment must be used for the Update Manager database user.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000033 - A least-privileges assignment must be used for the vCenter Server database user.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000034 - The system must use unique service accounts when applications connect to vCenter.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000036 - The system must produce audit records containing information to establish what type of events occurred.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND INFORMATION INTEGRITY

VCWN-06-000039 - Passwords must be at least 15 characters in length.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000040 - Passwords must contain at least one uppercase character.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000043 - Passwords must contain at least one special character.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

IDENTIFICATION AND AUTHENTICATION

VCWN-06-000045 - The system must limit the maximum number of failed login attempts to three.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

ACCESS CONTROL

VCWN-06-000046 - The system must set the interval for counting failed login attempts to at least 15 minutes.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

ACCESS CONTROL

VCWN-06-000047 - The system must require an administrator to unlock an account locked due to excessive login failures.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

ACCESS CONTROL

VCWN-06-000048 - The system must alert administrators on permission creation operations.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND INFORMATION INTEGRITY

VCWN-06-000051 - The system must protect the confidentiality and integrity of transmitted info by isolating IP-based storage traffic.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000052 - The system must enable the VSAN Health Check.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000054 - The system must configure the VSAN Datastore name to a unique name.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-100005 - The vCenter Server users must have the correct roles assigned.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION