AD.4033_2008_R2 - The computer clock synchronization tolerance must be limited to 5 minutes or less. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | AUDIT AND ACCOUNTABILITY |
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts | DISA STIG AIX 7.x v2r8 | Unix | |
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - openssh.base.server | DISA STIG AIX 7.x v2r5 | Unix | |
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - openssh.base.server | DISA STIG AIX 7.x v2r6 | Unix | |
AOSX-09-000575 - System must implement replay-resistant authentication mechanisms for network access to non-privileged accounts. | DISA STIG Apple Mac OSX 10.9 v1r2 | Unix | CONFIGURATION MANAGEMENT |
AOSX-10-000575 - System must implement replay-resistant authentication mechanisms for network access to non-privileged accounts. | DISA STIG Apple Mac OSX 10.10 v1r5 | Unix | CONFIGURATION MANAGEMENT |
AOSX-11-000570 - The system must implement replay-resistant auth mechanisms for network access to privileged and non-privileged accounts. | DISA STIG Apple Mac OSX 10.11 v1r6 | Unix | CONFIGURATION MANAGEMENT |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r5 | Windows | |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r7 | Windows | |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r1 | Windows | |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r2 | Windows | |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r4 | Windows | |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r6 | Windows | |
EDGE-00-000062 - The built-in DNS client must be disabled. | DISA STIG Edge v1r8 | Windows | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-300037 - Implement replay-resistant authentication mechanisms for network access by using Active Directory for local user auth. | DISA STIG VMware vSphere 6.x ESXi v1r4 | VMware | |
ESXI-06-300037 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using Active Directory for local user authentication. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-300038 - The VMM must implement replay-resistant authentication mechanisms by using the vSphere Authentication Proxy. | DISA STIG VMware vSphere 6.x ESXi v1r4 | VMware | |
ESXI-06-300038 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using the vSphere Authentication Proxy. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-300039 - The VMM must implement replay-resistant authentication mechanisms for network access - restrict AD ESX Admin group. | DISA STIG VMware vSphere 6.x ESXi v1r4 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-300039 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by restricting use of Active Directory ESX Admin group membership. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-67-000037 - The ESXi host must use Active Directory for local user authentication. | DISA STIG VMware vSphere 6.7 ESXi v1r2 | VMware | |
ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory. | DISA STIG VMware vSphere 6.7 ESXi v1r2 | VMware | |
ESXI-67-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory. | DISA STIG VMware vSphere 6.7 ESXi v1r2 | VMware | |
SYMP-AG-000380 - Symantec ProxySG providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts. | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | IDENTIFICATION AND AUTHENTICATION |
SYMP-AG-000380 - Symantec ProxySG providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts. | DISA Symantec ProxySG Benchmark ALG v1r1 | BlueCoat | ACCESS CONTROL |
UBTU-16-030200 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts. | DISA STIG Ubuntu 16.04 LTS v2r1 | Unix | |
WN16-DC-000020 - Kerberos user logon restrictions must be enforced. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN16-DC-000040 - The Kerberos user ticket lifetime must be limited to 10 hours or less. | DISA Windows Server 2016 STIG v2r6 | Windows | |
WN16-DC-000050 - The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN16-DC-000050 - The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2016 STIG v2r6 | Windows | |
WN16-DC-000060 - The computer clock synchronization tolerance must be limited to 5 minutes or less. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN19-DC-000020 - Windows Server 2019 Kerberos user logon restrictions must be enforced. | DISA Windows Server 2019 STIG v2r5 | Windows | |
WN19-DC-000020 - Windows Server 2019 Kerberos user logon restrictions must be enforced. | DISA Windows Server 2019 STIG v2r8 | Windows | |
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2019 STIG v2r4 | Windows | |
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2019 STIG v2r7 | Windows | |
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced. | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced. | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less. | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less. | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less. | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less. | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2022 STIG v1r1 | Windows | |
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less. | DISA Windows Server 2022 STIG v1r3 | Windows | |
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less. | DISA Windows Server 2022 STIG v1r4 | Windows | |
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less. | DISA Windows Server 2022 STIG v1r1 | Windows | |