Item Search

NameAudit NamePluginCategory
DTOO104 - Publisher - Disabling of user name and password syntax from being used in URLs must be enforced.DISA STIG Office 2010 Publisher v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - PowerPoint - Enabling IE Bind to Object functionality must be present.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO111 - Word - Enabling IE Bind to Object functionality must be present.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO117 - Word - Saved from URL mark to assure Internet zone processing must be enforced.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - PowerPoint - Navigation to URL's embedded in Office products must be blocked.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO124 - Project - Scripted Window Security must be enforced.DISA STIG Office 2010 Project v1r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO128 - Project - Data Execution Prevention must be enforced.DISA STIG Office 2010 Project v1r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Word - Links that invoke instances of IE from within an Office product must be blocked.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO132 - Project - File Downloads must be configured for proper restrictions.DISA STIG Office 2010 Project v1r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO133 - Word - All automatic loading from Trusted Locations must be disabled.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO134 - Word - Disallowance of Trusted Locations on the network must be enforced.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO201 - Office System - Connection verification of permissions must be enforced.DISA STIG Office System 2010 v1r13Windows

ACCESS CONTROL

DTOO210 - Word - Pre-release versions of file formats new to Office Products must be blocked.DISA STIG Office 2010 Word v1r12Windows

CONFIGURATION MANAGEMENT

DTOO211 - PowerPoint - ActiveX Installs must be configured for proper restriction.DISA STIG Office 2010 PowerPoint v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO292 - Word - Document behavior if file validation fails must be set - OpenInProtectedViewDISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO337 - Word - Word 95 binary documents and templates must be configured to edit in protected view.DISA STIG Office 2010 Word v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-030030 - The RHEL 8 Information System Security Officer (ISSO) and System Administrator (SA) (at a minimum) must have mail aliases to be notified of an audit processing failure.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030070 - RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030080 - RHEL 8 audit logs must be owned by root to prevent unauthorized read access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030170 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030171 - RHEL 8 must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/sudoers.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030190 - Successful/unsuccessful uses of the su command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030300 - Successful/unsuccessful uses of the mount command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030311 - Successful/unsuccessful uses of postdrop in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030312 - Successful/unsuccessful uses of postqueue in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030314 - Successful/unsuccessful uses of setfiles in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030330 - Successful/unsuccessful uses of the setfacl command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030340 - Successful/unsuccessful uses of the pam_timestamp_check command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030560 - Successful/unsuccessful uses of the usermod command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030580 - Successful/unsuccessful uses of the kmod command in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-030600 - Successful/unsuccessful modifications to the lastlog file in RHEL 8 must generate an audit record.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

RHEL-08-040070 - The RHEL 8 file system automounter must be disabled unless required.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-040080 - RHEL 8 must be configured to disable USB mass storage.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-040150 - A firewall must be able to protect against or limit the effects of Denial of Service (DoS) attacks by ensuring RHEL 8 can implement rate-limiting measures on impacted network interfaces.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-040250 - RHEL 8 must not forward IPv6 source-routed packets by default.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040262 - RHEL 8 must not accept router advertisements on all IPv6 interfaces by default.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040270 - RHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040283 - RHEL 8 must restrict exposed kernel pointer addresses access.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040286 - RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040321 - The graphical display manager must not be the default target on RHEL 8 unless approved.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040330 - RHEL 8 network interfaces must not be in promiscuous mode.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

RHEL-08-040380 - The iprutils package must not be installed unless mission essential on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

CONFIGURATION MANAGEMENT

SLES-15-010020 - The SUSE operating system must display the Standard Mandatory DOD Notice and Consent Banner before granting access via local console.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

ACCESS CONTROL

SLES-15-030760 - The SUSE operating system must generate audit records for the /run/utmp file.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

SLES-15-030780 - The SUSE operating system must generate audit records for the /var/log/btmp file.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

SLES-15-040000 - The SUSE operating system must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040130 - All SUSE operating system local initialization files must not execute world-writable programs.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040190 - SUSE operating system kernel core dumps must be disabled unless needed.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-15-040370 - The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT