Item Search

NameAudit NamePluginCategory
5.1.13 Set 'Configure Outlook object model prompt...CIS MS Office Outlook 2010 v1.0.0Windows

CONFIGURATION MANAGEMENT

5.2.5 Ensure Complex Password Must Contain Special Character Is ConfiguredCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

CIS_Docker_v1.7.0_L1_Docker_Swarm.audit from CIS Docker Benchmark v1.7.0CIS Docker v1.7.0 L1 Docker SwarmUnix
CIS_IBM_DB2_9_v3.0.1_Level_2_OS_Linux.audit from CIS DB2 9 LinuxCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix
CIS_Kubernetes_v1.11.1_L1_Worker_Node.audit from CIS Kubernetes Benchmark v1.11.1CIS Kubernetes v1.11.1 L1 Worker NodeUnix
CIS_MariaDB_10.6_Benchmark_v1.1.0_L1_Database.audit from CIS MariaDB 10.6 BenchmarkCIS MariaDB 10.6 Database L1 v1.1.0MySQLDB
CIS_MariaDB_10.6_Benchmark_v1.1.0_L2_Linux_OS.audit from CIS MariaDB 10.6 BenchmarkCIS MariaDB 10.6 on Linux L2 v1.1.0Unix
CIS_NGINX_v2.1.0_Level_2_Loadbalancer.audit from CIS NGINX Benchmark v2.1.0CIS NGINX Benchmark v2.1.0 L2 LoadbalancerUnix
CIS_NGINX_v2.1.0_Level_2_Webserver.audit from CIS NGINX Benchmark v2.1.0CIS NGINX Benchmark v2.1.0 L2 WebserverUnix
EP11-00-009100 - The EDB Postgres Advanced Server must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-CA-000145 - Exchange must provide redundancy.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-CA-000165 - Exchange must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

CONFIGURATION MANAGEMENT

EX13-EG-000015 - Exchange must have accepted domains configured.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

ACCESS CONTROL

EX13-EG-000130 - Exchange Send connectors must be clearly named.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000150 - Exchange Receive connectors must control the number of recipients per message.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000155 - The Exchange Internet Receive connector connections count must be set to default.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000165 - Exchange messages with a blank sender field must be rejected.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-000180 - The Exchange Sender filter must block unaccepted domains.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-000240 - The Exchange tarpitting interval must be set.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-000260 - The Exchange Simple Mail Transfer Protocol (SMTP) Sender filter must be enabled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-000295 - The Exchange software baseline copy must exist.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

CONFIGURATION MANAGEMENT

EX13-EG-000345 - Exchange internal Send connectors must require encryption.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Join Microsoft MAPSMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPSMSCT Windows 10 v2004 v1.0.0Windows

ACCESS CONTROL

MS.EXO.15.1v1 - URL comparison with a block-list SHOULD be enabled.CISA SCuBA Microsoft 365 Exchange Online v1.5.0microsoft_azure

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

SP13-00-000005 - SharePoint must support the requirement to initiate a session lock after 15 minutes of system or application inactivity has transpired.DISA STIG SharePoint 2013 v2r4Windows

ACCESS CONTROL

SP13-00-000010 - SharePoint must maintain and support the use of security attributes with stored information - Document Library'DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000020 - SharePoint must use cryptography to protect the integrity of the remote access session.DISA STIG SharePoint 2013 v2r4Windows

ACCESS CONTROL

SP13-00-000035 - SharePoint must identify data type, specification, and usage when transferring information between different security domains so policy restrictions may be applied.DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000055 - SharePoint must allow designated organizational personnel to select which auditable events are to be audited by specific components of the system.DISA STIG SharePoint 2013 v2r4Windows

AUDIT AND ACCOUNTABILITY

SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - ConnectionTimeoutDISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000060 - SharePoint must reject or delay, as defined by the organization, network traffic generated above configurable traffic volume thresholds - maxConnectionsDISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000065 - SharePoint must prevent the execution of prohibited mobile code.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000085 - SharePoint must implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.DISA STIG SharePoint 2013 v2r4Windows

IDENTIFICATION AND AUTHENTICATION

SP13-00-000100 - SharePoint must employ FIPS-validated cryptography to protect unclassified information when such information must be separated from individuals who have the necessary clearances yet lack the necessary access approvals.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000105 - SharePoint must validate the integrity of security attributes exchanged between systems.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000115 - SharePoint must terminate user sessions upon user logoff, and when idle time limit is exceeded.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000120 - SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000125 - SharePoint must implement an information system isolation boundary that minimizes the number of nonsecurity functions included within the boundary containing security functions.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000130 - SharePoint must implement security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000135 - SharePoint must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission, unless the transmitted data is otherwise protected by alternative physical measures.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000140 - SharePoint must prevent non-privileged users from circumventing malicious code protection capabilities.DISA STIG SharePoint 2013 v2r4Windows

ACCESS CONTROL

SP13-00-000145 - SharePoint must use mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.DISA STIG SharePoint 2013 v2r4Windows

IDENTIFICATION AND AUTHENTICATION

SP13-00-000150 - The SharePoint Central Administration site must not be accessible from Extranet or Internet connections.DISA STIG SharePoint 2013 v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000160 - The SharePoint farm service account (database access account) must be configured with minimum privileges in Active Directory (AD).DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000170 - The SharePoint setup account must be configured with the minimum privileges in Active Directory.DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000185 - A secondary SharePoint site collection administrator must be defined when creating a new site collection.DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000190 - When configuring SharePoint Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Attempt to Clean Infected Documents is enabled'DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000195 - SharePoint-specific malware (i.e. anti-virus) protection software must be integrated and configured - 'Scan Documents on Upload is enabled'DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION