Item Search

NameAudit NamePluginCategory
2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

5.4.3 Ensure password hashing algorithm is SHA-512CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.3 Ensure password hashing algorithm is SHA-512 - password-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.4.3 Ensure password hashing algorithm is SHA-512 - system-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

9.1 Starting Tomcat with Security ManagerCIS Apache Tomcat 7 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.1 Starting Tomcat with Security ManagerCIS Apache Tomcat 7 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

17.7.3 Ensure 'Audit Audit Policy Change' is set to include 'Success and Failure' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

18.8.7.1 (L1) Ensure 'Allow remote access to the Plug and Play interface' is set to 'Disabled'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

MEDIA PROTECTION

CIS_Microsoft_Windows_Server_2019_STIG_v3.0.0_Next_Generation_Windows_Security_-_Domain_Controller.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v3.0.0CIS Microsoft Windows Server 2019 STIG v3.0.0 NG DCWindows
CIS_Microsoft_Windows_Server_2022_STIG_v2.0.0_Next_Generation_Windows_Security_-_Domain_Controller.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v2.0.0CIS Microsoft Windows Server 2022 STIG v2.0.0 NG DCWindows
DTOO104 - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - The Internet Explorer Bind to Object functionality must be enabled.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Scripted Window Security must be enforced.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO211 - ActiveX Installs must be configured for proper restriction.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO999-OneNote13 - The version of OneNote running on the system must be a supported version.DISA STIG Microsoft OneNote 2013 v1r4Windows

SYSTEM AND INFORMATION INTEGRITY

FGFW-ND-000020 - The FortiGate device must automatically audit account removal actionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000035 - The FortiGate device must allow full access to only those individuals or roles designated by the ISSM.DISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000040 - The FortiGate device must audit the execution of privileged functionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

FGFW-ND-000060 - The FortiGate device must log all user activity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000070 - The FortiGate device must generate audit records when successful/unsuccessful attempts to delete administrator privileges occurDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000105 - The FortiGate device must allocate audit record storage capacity in accordance with organization-defined audit record storage requirementsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY

FGFW-ND-000120 - The FortiGate device must synchronize internal information system clocks using redundant authoritative time sourcesDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FGFW-ND-000165 - The FortiGate device must use LDAP for authentication.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000175 - The FortiGate device must generate log records for a locally developed list of auditable eventsDISA Fortigate Firewall NDM STIG v1r4FortiGate

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

FGFW-ND-000180 - The FortiGate device must conduct backups of system-level information contained in the information system when changes occur.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING

FGFW-ND-000200 - The FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accountsDISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000220 - The FortiGate device must enforce a minimum 15-character password length.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000225 - The FortiGate device must enforce password complexity by requiring that at least one uppercase character be used.DISA Fortigate Firewall NDM STIG v1r4FortiGate

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000285 - The FortiGate device must only allow authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media (such as a flash drive).DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-002300 MongoDB must protect its audit features from unauthorized access.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

MD7X-00-002900 Database objects (including but not limited to tables, indexes, storage, stored procedures, functions, triggers, links to software external to MongoDB, etc.) must be owned by database/DBMS principals authorized for ownership.DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

CONFIGURATION MANAGEMENT

MD7X-00-004200 MongoDB must map the PKI-authenticated identity to an associated user account.DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

IDENTIFICATION AND AUTHENTICATION

MD7X-00-005500 MongoDB must prevent unauthorized and unintended information transfer via shared system resources.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-006700 MongoDB must enforce discretionary access control (DAC) policies, as defined by the data owner, over defined subjects and objects.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

ACCESS CONTROL

MD7X-00-007300 MongoDB must provide a warning to appropriate support staff when allocated audit record storage volume reaches 75 percent of maximum audit record storage capacity.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

MD7X-00-008000 The DBMS must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

CONFIGURATION MANAGEMENT

MD7X-00-008300 MongoDB must use NSA-approved cryptography to protect classified information in accordance with the data owner's requirements.DISA MongoDB Enterprise Advanced 7.x STIG v1r1MongoDB

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-008400 MongoDB must only accept end entity certificates issued by DOD PKI or DOD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-008900 MongoDB must maintain the confidentiality and integrity of information during reception.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

MD7X-00-012400 MongoDB must off-load audit data to a separate log management facility; this must be continuous and in near real time for systems with a network connection to the storage facility and weekly or more often for standalone systems.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-040810 - The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

VCLU-70-000006 - Lookup Service must generate log records for system startup and shutdown.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

AUDIT AND ACCOUNTABILITY

VCUI-70-000006 - vSphere UI must generate log records for system startup and shutdown.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

AUDIT AND ACCOUNTABILITY

WN10-CC-000038 - WDigest Authentication must be disabled.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN16-CC-000030 - WDigest Authentication must be disabled on Windows Server 2016.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-CC-000020 - Windows Server 2019 must have WDigest Authentication disabled.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT