Item Search

NameAudit NamePluginCategory
AIOS-02-080103 - Apple iOS must not allow backup to remote systems (managed applications data stored in iCloud).AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-090100 - Apple iOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-03-080101 - Apple iOS must implement the management setting: use SSL for Exchange ActiveSync.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

CASA-FW-000090 - The Cisco ASA must be configured to queue log records locally in the event that the central audit server is down or not reachable - QueueDISA STIG Cisco ASA FW v2r1Cisco

AUDIT AND ACCOUNTABILITY

CASA-FW-000290 - The Cisco ASA must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF) - ACLDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

CASA-FW-000290 - The Cisco ASA must be configured to restrict it from accepting outbound packets that contain an illegitimate address in the source address field via an egress filter or by enabling Unicast Reverse Path Forwarding (uRPF) - network-objectDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

KNOX-07-000500 - The Samsung Android 7 with Knox must be configured to lock the display after 15 minutes (or less) of inactivity.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

ACCESS CONTROL

KNOX-07-012400 - The Samsung Android 7 with Knox must implement the management setting: Disable Allow New Admin Install.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012400 - The Samsung Android 7 with Knox must implement the management setting: Disable Allow New Admin Install.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-012600 - The Samsung Android 7 with Knox must implement the management setting: Disable USB host storage.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-014300 - The Samsung Android 7 with Knox must implement the management setting: Container Account whitelist.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-018400 - The Samsung Android 7 with Knox must implement the management setting: Configure application disable list.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-912200 - The Samsung Android 7 with Knox must be configured to lock the container after 15 minutes (or less) of inactivity.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-912200 - The Samsung Android 7 with Knox must be configured to lock the container after 15 minutes (or less) of inactivity.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-913800 - The Samsung Android 7 with Knox must implement the management setting: Disable Move Applications to Container.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914100 - The Samsung Android 7 with Knox must implement the management setting: Configure Container application disable list.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914200 - The Samsung must implement the management setting: Disable automatic completion of Container browser text input.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

KNOX-07-914500 - The Samsung Android 7 with Knox must implement the management setting: Configure minimum Container password complexity.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

RHEL-07-010344 - The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-040711 - The Red Hat Enterprise Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000060 - Splunk Enterprise must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix

ACCESS CONTROL

SPLK-CL-000270 - Splunk Enterprise must use TCP for data transmission.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

CONFIGURATION MANAGEMENT

SYMP-AG-000140 - Symantec ProxySG providing user access control intermediary services must generate audit records when successful/unsuccessful attempts to access web resources occur.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

VCEM-70-000013 - ESX Agent Manager must have mappings set for Java servlet pages.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

CONFIGURATION MANAGEMENT

VCEM-70-000021 - ESX Agent Manager must use the 'setCharacterEncodingFilter' filter - filterDISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCEM-70-000025 - ESX Agent Manager must be configured to not show error reports.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCEM-70-000028 - ESX Agent Manager must have the debug option disabled.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCEM-70-000033 - ESX Agent Manager default servlet must be set to 'readonly'.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

CONFIGURATION MANAGEMENT

VCLD-70-000010 - VAMI must only load allowed server modulesDISA STIG VMware vSphere 7.0 VAMI v1r2Unix

CONFIGURATION MANAGEMENT

VCLD-70-000012 - VAMI must explicitly disable Multipurpose Internet Mail Extensions (MIME) mime mappings based on 'Content-Type'.DISA STIG VMware vSphere 7.0 VAMI v1r2Unix

CONFIGURATION MANAGEMENT

VCLD-70-000019 - VAMI must set the encoding for all text Multipurpose Internet Mail Extensions (MIME) types to UTF-8 - rbDISA STIG VMware vSphere 7.0 VAMI v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCLU-70-000010 - Lookup Service must not be configured with the 'UserDatabaseRealm' enabled.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

CONFIGURATION MANAGEMENT

VCLU-70-000020 - Lookup Service must set URIEncoding to UTF-8.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCLU-70-000023 - Lookup Service must be configured to hide the server version.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCLU-70-000026 - Lookup Service must have the debug option turned off.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCPF-70-000012 - Performance Charts must have Multipurpose Internet Mail Extensions (MIMEs) that invoke operating system shell programs disabled.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

CONFIGURATION MANAGEMENT

VCPF-70-000032 - Performance Charts must disable the shutdown port.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCSA-70-000034 - The vCenter Server must produce audit records containing information to establish what type of events occurred.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

AUDIT AND ACCOUNTABILITY

VCSA-70-000057 - vCenter Server plugins must be verified.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-70-000266 - The vCenter Server must require an administrator to unlock an account locked due to excessive login failures.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

ACCESS CONTROL

VCSA-70-000269 - The vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to 'Reject'.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-70-000270 - The vCenter Server must set the distributed port group Promiscuous Mode policy to 'Reject'.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-70-000275 - The vCenter Server must configure the 'vpxuser' auto-password to be changed every 30 days.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-70-000294 - vCenter Native Key Providers must be backed up with a strong password.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCST-70-000001 - The Security Token Service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

ACCESS CONTROL

VCST-70-000016 - The Security Token Service must not have any symbolic links in the web content directory tree.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

CONFIGURATION MANAGEMENT

VCST-70-000025 - The Security Token Service must not enable support for TRACE requests.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

VCUI-70-000001 - vSphere UI must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

ACCESS CONTROL

VCUI-70-000019 - vSphere UI must fail to a known safe state if system initialization fails, shutdown fails, or aborts fail.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCUI-70-000031 - vSphere UI must disable the shutdown port.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION