Item Search

NameAudit NamePluginCategory
DB2X-00-005800 - Access to database files must be limited to relevant processes and to authorized, administrative usersDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

SYSTEM AND COMMUNICATIONS PROTECTION

DB2X-00-005800 - Access to database files must be limited to relevant processes and to authorized, administrative usersDISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

DB2X-00-005800 - Access to database files must be limited to relevant processes and to authorized, administrative usersDISA STIG IBM DB2 v10.5 LUW v2r1 OS WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002330 - Audio devices must not have extended ACLs - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002360 - Audio devices must be group-owned by root, sys, bin, or system - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002360 - Audio devices must be group-owned by root, sys, bin, or system - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002420 - Removable media, remote file systems, and any file system not containing approved setuid files must be mounted with the nosuid option - nosuid option.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004400 - Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004510 - The SMTP service log file must not have an extended ACL.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/vsftpd.ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004950 - The ftpusers file must not have an extended ACL - '/etc/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005040 - All FTP users must have a default umask of 077 - '/etc/xinetd.d/gssftp'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005140 - Any active TFTP daemon must be authorized and approved in the system accreditation package.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000460 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG Oracle 12c v3r4 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-011900 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-006100 - Access to database files must be limited to relevant processes and to authorized, administrative users.EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010460 - The sticky bit must be set on all SUSE operating system world-writable directories.DISA SLES 12 STIG v3r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-002000 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-009800 - SQL Server must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-009900 - SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-010410 - All public directories must be owned by root to prevent unauthorized and unintended information transferred via shared system resources.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000275 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-EP-000310 - Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000150 - Anonymous enumeration of shares must be restricted.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000165 - Anonymous access to Named Pipes and Shares must be restricted.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000058 - The system must be configured to prevent unsolicited remote assistance offers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000059 - Solicited Remote Assistance must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000098 - Local drives must be prevented from sharing with Remote Desktop Session Hosts. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-GE-000018 - Non system-created file shares on a system must limit access to groups that require it.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000052 - Anonymous enumeration of shares must be restricted.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-DC - Named pipes that can be accessed anonymously must be configured with limited values on domain controllers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-MS - Named pipes that can be accessed anonymously must be configured to contain no values on member servers.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000056 - Unauthorized remotely accessible registry paths must not be configured.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000057 - Unauthorized remotely accessible registry paths and sub-paths must not be configured.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000058 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000058 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000059 - Network shares that can be accessed anonymously must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000060 - The system must be configured to use the Classic security model.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000060 - The system must be configured to use the Classic security model.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000380 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Microsoft Windows Server 2016 STIG v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000300 - Anonymous access to Named Pipes and Shares must be restricted.DISA Microsoft Windows Server 2016 STIG v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-00-000230 - Windows Server 2019 non-system-created file shares must limit access to groups that require it.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000350 - Windows Server 2019 Remote Desktop Services must prevent drive redirection.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000230 - Windows Server 2019 must not allow anonymous enumeration of shares.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000250 - Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.DISA Microsoft Windows Server 2019 STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION