Item Search

NameAudit NamePluginCategory
2.2 Ensure that WMI probing is disabledCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

2.3 Ensure that User-ID is only enabled for internal trusted interfacesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabledCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

ALMA-09-018720 - The firewalld service on AlmaLinux OS 9 must be active.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

ALMA-09-031700 - AlmaLinux OS 9 must have the firewalld package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AS24-U1-000360 - The Apache web server must be configured to use a specified IP address and port.DISA STIG Apache Server 2.4 Unix Server v3r2 MiddlewareUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

AS24-U1-000360 - The Apache web server must be configured to use a specified IP address and port.DISA STIG Apache Server 2.4 Unix Server v3r2Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

AS24-U2-000360 - The Apache web server must be configured to use a specified IP address and port.DISA STIG Apache Server 2.4 Unix Site v2r6Unix

CONFIGURATION MANAGEMENT

AS24-U2-000360 - The Apache web server must be configured to use a specified IP address and port.DISA STIG Apache Server 2.4 Unix Site v2r6 MiddlewareUnix

CONFIGURATION MANAGEMENT

AS24-W1-000360 - The Apache web server must be configured to use a specified IP address and port - Zero IPs OnlyDISA STIG Apache Server 2.4 Windows Server v3r3Windows

CONFIGURATION MANAGEMENT

AS24-W2-000360 - The Apache web server must be configured to use a specified IP address and port - Zero IPs OnlyDISA STIG Apache Server 2.4 Windows Site v2r2Windows

CONFIGURATION MANAGEMENT

CISC-ND-000470 - The Cisco router must be configured to prohibit the use of all unnecessary and nonsecure functions and services.DISA Cisco IOS XE Router NDM STIG v3r4Cisco

CONFIGURATION MANAGEMENT

CISC-ND-000470 - The Cisco switch must be configured to prohibit the use of all unnecessary and non-secure functions and services.DISA STIG Cisco IOS Switch NDM v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-ND-000470 - The Cisco switch must be configured to prohibit the use of all unnecessary and nonsecure functions and services.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-ND-000470 - The Cisco switch must be configured to prohibit the use of all unnecessary and nonsecure functions and services.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

CONFIGURATION MANAGEMENT

CNTR-R2-000580 - Rancher RKE2 runtime must enforce ports, protocols, and services that adhere to the PPSM CAL.DISA Rancher Government Solutions RKE2 STIG v2r3Unix

CONFIGURATION MANAGEMENT

F5BI-DM-000093 - The BIG-IP appliance must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assurance List (CAL) and vulnerability assessments.DISA F5 BIG-IP Device Management STIG v2r4F5

CONFIGURATION MANAGEMENT

GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-reply -j DROP'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-request -j DROP'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003603 - The system must not respond to Internet Control Message Protocol v4 (ICMPv4) echoes sent to a broadcast address.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003604 - The system must not respond to Internet Control Message Protocol (ICMP) timestamp requests sent to a broadcast address.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003607 - The system must not accept source-routed IPv4 packets - 'net.ipv4.conf.all.accept_source_route'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003607 - The system must not accept source-routed IPv4 packets - 'net.ipv4.conf.default.accept_source_route'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003609 - The system must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages - 'net.ipv4.conf.all.accept_redirects'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003609 - The system must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages - 'net.ipv4.conf.default.accept_redirects'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003610 - The system must not send IPv4 Internet Control Message Protocol (ICMP) redirects - 'net.ipv4.conf.all.send_redirects'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003610 - The system must not send IPv4 Internet Control Message Protocol (ICMP) redirects - 'net.ipv4.conf.default.send_redirects'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007860 - The system must ignore IPv6 ICMP redirect messages.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007920 - The system must not forward IPv6 source-routed packets - 'net.ipv6.conf.all.forwarding'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN007920 - The system must not forward IPv6 source-routed packets - 'net.ipv6.conf.default.forwarding'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-VN-000016 - The Juniper SRX Services Gateway VPN must use IKEv2 for IPsec VPN security associations.DISA Juniper SRX Services Gateway VPN v3r1Juniper

CONFIGURATION MANAGEMENT

MD3X-00-000290 - Unused database components that are integrated in MongoDB and cannot be uninstalled must be disabled.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

CONFIGURATION MANAGEMENT

O19C-00-013500 - Oracle Database must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL) and vulnerability assessments.DISA Oracle Database 19c STIG v1r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-C2-001700 - The DBMS must support the disabling of network protocols deemed by the organization to be nonsecure.DISA STIG Oracle 12c v3r2 WindowsWindows

CONFIGURATION MANAGEMENT

OH12-1X-000173 - OHS must be configured to use a specified IP address, port, and protocol - ssl.confDISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OL07-00-040100 - The Oracle Linux operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Component Local Service Assessment (PPSM CLSA) and vulnerability assessments - PPSM CLSA and vulnerability assessments.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

PGS9-00-000100 - PostgreSQL must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

CONFIGURATION MANAGEMENT

RHEL-06-000125 - The Stream Control Transmission Protocol (SCTP) must be disabled unless required.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000203 - The xinetd service must be disabled if no network services utilizing it are enabled - PROCESS_CHECK.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000221 - The ypbind service must not be running - PROCESSDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000221 - The ypbind service must not be running.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000249 - Mail relaying must be restricted.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000262 - The atd service must be disabled - CHKCONFIG.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000265 - The ntpdate service must not be running - 'PROCESS_CHECK'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-06-000268 - The rdisc service must not be running - 'CHKCONFIG'.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-040100 - The Red Hat Enterprise Linux operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management Component Local Service Assessment (PPSM CLSA) and vulnerability assessments.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

RHEL-09-251010 - RHEL 9 must have the firewalld package installed.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SLES-12-030030 - The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT

SQL6-D0-007600 - SQL Server must be configured to prohibit or restrict the use of organization-defined protocols as defined in the PPSM CAL and vulnerability assessments.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

CONFIGURATION MANAGEMENT

vCenter: vcenter-8.tls-profileVMware vSphere Security Configuration and Hardening GuideVMware

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION