Item Search

NameAudit NamePluginCategory
DTOO104 - PowerPoint - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO104 - Word - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO110 - Word - Blocking as default file block opening behavior must be enforced.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - OneNote - Enabling IE Bind to Object functionality must be present.DISA STIG Office 2010 OneNote v1r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - Outlook - Enabling IE Bind to Object functionality must be present.DISA STIG Office 2010 Outlook v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - Outlook - Saved from URL mark to assure Internet zone processing must be enforced.DISA STIG Office 2010 Outlook v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - PowerPoint - Saved from URL mark to assure Internet zone processing must be enforced.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO121 - Word - Files from the Internet zone must be opened in Protected View.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - PowerPoint - Scripted Window Security must be enforced.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - PowerPoint - Add-on Management functionality must be allowed.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO126 - Word - Add-on Management functionality must be allowed.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO128 - InfoPath - Data Execution Prevention must be enforced.DISA STIG Office 2010 InfoPath v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO160 - InfoPath - Unsafe file types must be prevented from being attached to InfoPath forms.DISA STIG Office 2010 InfoPath v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO177 - Office System - Access to updates, add-ins, and patches on Office.com must be disabled.DISA STIG Office System 2010 v1r13Windows

CONFIGURATION MANAGEMENT

DTOO186 - Office System - Trust Bar notifications for Security messages must be enforced.DISA STIG Office System 2010 v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO207 - Office System - Document Information panel Beaconing must show UI.DISA STIG Office System 2010 v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO232 - Outlook - Outlook Object Model scripts must be disallowed to run for shared folders.DISA STIG Office 2010 Outlook v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO242 - Outlook - Prompting behavior for Level 1 attachments on sending must be configured.DISA STIG Office 2010 Outlook v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO292 - Word - Document behavior if file validation fails must be set - DisableEditFromPVDISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO302 - Word - The automatically update links feature must be configured as off.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO312 - Office System - Customer-submitted templates downloads from Office.com must be disallowed.DISA STIG Office System 2010 v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO328 - Word - Online translation dictionaries must be in use.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN000000-AIX0085 - The /etc/netsvc.conf file must be root owned.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN000242 - The system must use at least two time sources for clock synchronization - 'NTP daemon is started at boot'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN001020 - The root account must not be used for direct logins.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN001210 - All system command files must not have extended ACLs - '/usr/bin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001210 - All system command files must not have extended ACLs - '/usr/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001210 - All system command files must not have extended ACLs - '/usr/ucb/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001220 - All system files, programs, and directories must be owned by a system account - '/bin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001220 - All system files, programs, and directories must be owned by a system account - '/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001240 - System files, programs, and directories must be group-owned by a system group - '/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001310 - All library files must not have extended ACLs - '/lib/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config AUD_it exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Chpriv exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Mknod exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config PROC_Setpgid exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config RESTORE_Import exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events AUD_it exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events BACKUP_Export exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events FS_Umount exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PASSWORD_Check exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_Change exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005820 - The NFS anonymous UID and GID must be configured to values without permissions.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006400 - The Network Information System (NIS) protocol must not be used.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009180 - The system must not have the tool-talk database server (ttdbserver) service active.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009230 - The system must not have the echo service active.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009270 - The system must not have the netstat service active on the inetd process.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009340 - Xserver login managers must not be running unless needed for X11 session management.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL