Item Search

NameAudit NamePluginCategory
GEN002280 - Device files and directories must only be writable by users with a system account or as configured by the vendor.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002330 - Audio devices must not have extended ACLs - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002330 - Audio devices must not have extended ACLs - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002340 - Audio devices must be owned by root - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002360 - Audio devices must be group-owned by root, sys, bin, or system - '/dev/audio*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002520 - All public directories must be owned by root or an application account.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002540 - All public directories must be group-owned by root, sys, bin, or an application group.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004400 - Files executed through a mail aliases file must be owned by root and must reside within a directory owned and writable only by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004420 - Files executed through a mail aliases file must have mode 0755 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004430 - Files executed through a mail aliases file must not have extended ACLs.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004480 - The SMTP service log file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004500 - The SMTP service log file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004880 - The ftpusers file must exist.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004900 - The ftpusers file must contain account names not allowed to use FTP.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004920 - The ftpusers file must be owned by root - '/etc/vsftpd/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004930 - The ftpusers file must be group-owned by root, bin, sys, or system - '/etc/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004940 - The ftpusers file must have mode 0640 or less permissive - '/etc/vsftpd/ftpusers'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005000 - Anonymous FTP accounts must not have a functional shell.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005040 - All FTP users must have a default umask of 077 - '/etc/vsftpd/vsftpd.conf anon_umask'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005040 - All FTP users must have a default umask of 077 - '/etc/xinetd.d/gssftp'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005100 - The TFTP daemon must have mode 0755 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005120 - The TFTP daemon must be configured to vendor specifications, including a dedicated TFTP user account, a non-login shell such as /bin/false, and a home directory owned by the TFTP user.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005740 - The Network File System (NFS) export configuration file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005750 - The Network File System (NFS) export configuration file must be group-owned by root, bin, sys, or system.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005760 - The Network File System (NFS) export configuration file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005800 - All Network File System (NFS) exported system files and system directories must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000460 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG MongoDB Enterprise Advanced 3.x v2r2 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG Oracle 11.2g v2r4 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-003900 - The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.DISA STIG Oracle 12c v2r9 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-012500 - DBMS backup and restoration files must be protected from unauthorized access.DISA STIG Oracle 12c v2r9 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG Oracle 12c v2r9 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA STIG SQL Server 2016 Instance OS Audit v2r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-010410 - All public directories must be owned by root to prevent unauthorized and unintended information transferred via shared system resources.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-00-000060 - Non system-created file shares on a system must limit access to groups that require it.DISA Windows 10 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000155 - Solicited Remote Assistance must not be allowed.DISA Windows 10 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000275 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Windows 10 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-EP-000310 - Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.DISA Windows 10 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000150 - Anonymous enumeration of shares must be restricted.DISA Windows 10 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000165 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows 10 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-DC - Named pipes that can be accessed anonymously must be configured with limited values on domain controllers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-MS - Named pipes that can be accessed anonymously must be configured to contain no values on member servers.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-00-000250 - Non-system-created file shares on a system must limit access to groups that require it.DISA Windows Server 2016 STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000380 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Windows Server 2016 STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-DC-000120 - Data files owned by users must be on a different logical partition from the directory server data files.DISA Windows Server 2016 STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-00-000230 - Windows Server 2019 non-system-created file shares must limit access to groups that require it.DISA Windows Server 2019 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000230 - Windows Server 2019 must not allow anonymous enumeration of shares.DISA Windows Server 2019 STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION