Item Search

NameAudit NamePluginCategory
AD.4033_2008_R2 - The computer clock synchronization tolerance must be limited to 5 minutes or less.DISA Windows Server 2008 R2 DC STIG v1r34Windows

AUDIT AND ACCOUNTABILITY

AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accountsDISA STIG AIX 7.x v2r8Unix
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - openssh.base.serverDISA STIG AIX 7.x v2r5Unix
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - openssh.base.serverDISA STIG AIX 7.x v2r6Unix
AOSX-09-000575 - System must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.DISA STIG Apple Mac OSX 10.9 v1r2Unix

CONFIGURATION MANAGEMENT

AOSX-10-000575 - System must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.DISA STIG Apple Mac OSX 10.10 v1r5Unix

CONFIGURATION MANAGEMENT

AOSX-11-000570 - The system must implement replay-resistant auth mechanisms for network access to privileged and non-privileged accounts.DISA STIG Apple Mac OSX 10.11 v1r6Unix

CONFIGURATION MANAGEMENT

EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r5Windows
EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r7Windows
EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r1Windows
EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r2Windows
EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r4Windows
EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r6Windows
EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v1r8Windows

IDENTIFICATION AND AUTHENTICATION

ESXI-06-300037 - Implement replay-resistant authentication mechanisms for network access by using Active Directory for local user auth.DISA STIG VMware vSphere 6.x ESXi v1r4VMware
ESXI-06-300037 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using Active Directory for local user authentication.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-300038 - The VMM must implement replay-resistant authentication mechanisms by using the vSphere Authentication Proxy.DISA STIG VMware vSphere 6.x ESXi v1r4VMware
ESXI-06-300038 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by using the vSphere Authentication Proxy.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-300039 - The VMM must implement replay-resistant authentication mechanisms for network access - restrict AD ESX Admin group.DISA STIG VMware vSphere 6.x ESXi v1r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-300039 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by restricting use of Active Directory ESX Admin group membership.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-67-000037 - The ESXi host must use Active Directory for local user authentication.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
ESXI-67-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
SYMP-AG-000380 - Symantec ProxySG providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

IDENTIFICATION AND AUTHENTICATION

SYMP-AG-000380 - Symantec ProxySG providing user authentication intermediary services must implement replay-resistant authentication mechanisms for network access to nonprivileged accounts.DISA Symantec ProxySG Benchmark ALG v1r1BlueCoat

ACCESS CONTROL

UBTU-16-030200 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts.DISA STIG Ubuntu 16.04 LTS v2r1Unix
WN16-DC-000020 - Kerberos user logon restrictions must be enforced.DISA Windows Server 2016 STIG v2r7Windows
WN16-DC-000040 - The Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2016 STIG v2r6Windows
WN16-DC-000050 - The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2016 STIG v2r7Windows
WN16-DC-000050 - The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2016 STIG v2r6Windows
WN16-DC-000060 - The computer clock synchronization tolerance must be limited to 5 minutes or less.DISA Windows Server 2016 STIG v2r7Windows
WN19-DC-000020 - Windows Server 2019 Kerberos user logon restrictions must be enforced.DISA Windows Server 2019 STIG v2r5Windows
WN19-DC-000020 - Windows Server 2019 Kerberos user logon restrictions must be enforced.DISA Windows Server 2019 STIG v2r8Windows
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2019 STIG v2r4Windows
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2019 STIG v2r7Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2022 STIG v1r1Windows