Item Search

NameAudit NamePluginCategory
CISC-RT-000060 - The Cisco router must be configured to have all inactive interfaces disabled.DISA STIG Cisco IOS Router RTR v2r6Cisco

ACCESS CONTROL

CISC-RT-000060 - The Cisco router must be configured to have all inactive interfaces disabled.DISA STIG Cisco IOS-XR Router RTR v2r4Cisco

ACCESS CONTROL

CISC-RT-000060 - The Cisco switch must be configured to have all inactive layer 3 interfaces disabled.DISA STIG Cisco IOS XE Switch RTR v2r5Cisco

ACCESS CONTROL

CISC-RT-000060 - The Cisco switch must be configured to have all inactive layer 3 interfaces disabled.DISA STIG Cisco NX-OS Switch RTR v2r3Cisco

ACCESS CONTROL

CISC-RT-000060 - The Cisco switch must be configured to have all inactive Layer 3 interfaces disabled.DISA STIG Cisco IOS Switch RTR v2r5Cisco

ACCESS CONTROL

CISC-RT-000230 - The Cisco switch must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA STIG Cisco IOS XE Switch RTR v2r5Cisco

ACCESS CONTROL

CISC-RT-000250 - The Cisco perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.DISA STIG Cisco IOS Router RTR v2r6Cisco

ACCESS CONTROL

CISC-RT-000250 - The Cisco perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.DISA STIG Cisco IOS XE Router RTR v2r9Cisco

ACCESS CONTROL

CISC-RT-000250 - The Cisco perimeter switch must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.DISA STIG Cisco NX-OS Switch RTR v2r3Cisco

ACCESS CONTROL

CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.DISA STIG Cisco IOS Router RTR v2r6Cisco

ACCESS CONTROL

CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Cisco IOS Router RTR v2r6Cisco

ACCESS CONTROL

CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Cisco IOS XE Router RTR v2r9Cisco

ACCESS CONTROL

CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Cisco IOS-XR Router RTR v2r4Cisco

ACCESS CONTROL

CISC-RT-000300 - The Cisco perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.DISA STIG Cisco IOS-XR Router RTR v2r4Cisco

ACCESS CONTROL

CISC-RT-000790 - The Cisco multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.DISA STIG Cisco IOS XE Router RTR v2r9Cisco

ACCESS CONTROL

CISC-RT-000790 - The Cisco multicast switch must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.DISA STIG Cisco NX-OS Switch RTR v2r3Cisco

ACCESS CONTROL

CISC-RT-000800 - The Cisco multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.DISA STIG Cisco IOS Router RTR v2r6Cisco

ACCESS CONTROL

CISC-RT-000800 - The Cisco multicast switch must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled - PIM neighbor filter to interfaces that have PIM enabledDISA STIG Cisco NX-OS Switch RTR v2r3Cisco

ACCESS CONTROL

CISC-RT-000810 - The Cisco multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.DISA STIG Cisco IOS Router RTR v2r6Cisco

ACCESS CONTROL

CISC-RT-000810 - The Cisco multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.DISA STIG Cisco IOS-XR Router RTR v2r4Cisco

ACCESS CONTROL

CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic.DISA STIG Cisco NX-OS Switch RTR v2r3Cisco

ACCESS CONTROL

CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic.DISA STIG Cisco IOS XE Switch RTR v2r5Cisco

ACCESS CONTROL

CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic.DISA STIG Cisco IOS Switch RTR v2r5Cisco

ACCESS CONTROL

CISC-RT-000830 - The Cisco multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources.DISA STIG Cisco IOS-XR Router RTR v2r4Cisco

ACCESS CONTROL

CISC-RT-000840 - The Cisco multicast Rendezvous Point (RP) switch must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Cisco switch (DR) for any undesirable multicast groups - DR for any undesirable multicast groupsDISA STIG Cisco NX-OS Switch RTR v2r3Cisco

ACCESS CONTROL

DTBC-0001 - Firewall traversal from remote host must be disabled.DISA STIG Google Chrome v2r9Windows

ACCESS CONTROL

DTBI032-IE11 - Accessing data sources across domains must be disallowed (Internet zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI039-IE11 - Navigating windows and frames across different domains must be disallowed (Internet zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI122-IE11 - Accessing data sources across domains must be disallowed (Restricted Sites zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI129-IE11 - Navigating windows and frames across different domains must be disallowed (Restricted Sites zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI515-IE11 - Websites in less privileged web content zones must be prevented from navigating into the Internet zone.DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI520-IE11 - Websites in less privileged web content zones must be prevented from navigating into the Restricted Sites zone.DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI1000-IE11 - Dragging of content from different domains within a window must be disallowed (Internet zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI1005-IE11 - Dragging of content from different domains across windows must be disallowed (Restricted Sites zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

DTBI1025-IE11 - Dragging of content from different domains within a window must be disallowed (Restricted Sites zone).DISA STIG IE 11 v2r4Windows

ACCESS CONTROL

F5BI-AF-000007 - The BIG-IP AFM module must be configured to restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.DISA F5 BIG-IP Advanced Firewall Manager STIG v2r1F5

ACCESS CONTROL

JUNI-RT-000060 - The Juniper router must be configured to have all inactive interfaces disabled.DISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000300 - The Juniper perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.DISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000410 - The Juniper out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.DISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000780 - The Juniper multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.DISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000790 - The Juniper multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled - policy-options prefixDISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000820 - The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources - policy-optionsDISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000820 - The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources - protocols pimDISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUNI-RT-000830 - The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Join messages received from the Designated Juniper router (DR) for any undesirable multicast groups - protocols pimDISA STIG Juniper Router RTR v2r4Juniper

ACCESS CONTROL

JUSX-VN-000009 - The Juniper SRX Services Gateway VPN must ensure inbound and outbound traffic is configured with a security policy in compliance with information flow control policies.DISA Juniper SRX Services Gateway VPN v2r2Juniper

ACCESS CONTROL

RHEL-06-000241 - The SSH daemon must not permit user environment settings.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

SP13-00-000030 - SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.DISA STIG SharePoint 2013 v2r3Windows

ACCESS CONTROL

WNFWA-000001 - Windows Defender Firewall with Advanced Security must be enabled when connected to a domain.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL

WNFWA-000002 - Windows Defender Firewall with Advanced Security must be enabled when connected to a private network.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL

WNFWA-000003 - Windows Defender Firewall with Advanced Security must be enabled when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL