OL07-00-020022 - The Oracle Linux operating system must not allow privileged accounts to utilize SSH. | DISA Oracle Linux 7 STIG v2r14 | Unix | ACCESS CONTROL |
RHEL-07-020022 - The Red Hat Enterprise Linux operating system must not allow privileged accounts to utilize SSH. | DISA Red Hat Enterprise Linux 7 STIG v3r14 | Unix | ACCESS CONTROL |
RHEL-07-020023 - The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command. | DISA Red Hat Enterprise Linux 7 STIG v3r14 | Unix | ACCESS CONTROL |
SOL-11.1-090120 - The operating system must prevent non-privileged users from circumventing malicious code protection capabilities. | DISA STIG Solaris 11 X86 v2r9 | Unix | ACCESS CONTROL |
WN10-00-000070 - Only accounts responsible for the administration of a system must have Administrator rights on the system. | DISA Windows 10 STIG v2r8 | Windows | ACCESS CONTROL |
WN10-SO-000167 - Remote calls to the Security Account Manager (SAM) must be restricted to Administrators. | DISA Windows 10 STIG v2r8 | Windows | ACCESS CONTROL |
WN10-UR-000035 - The Change the system time user right must only be assigned to Administrators and Local Service and NT SERVICE\autotimesvc. | DISA Windows 10 STIG v2r8 | Windows | ACCESS CONTROL |
WN10-UR-000040 - The Create a pagefile user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v2r8 | Windows | ACCESS CONTROL |
WN10-UR-000055 - The Create permanent shared objects user right must not be assigned to any groups or accounts. | DISA Windows 10 STIG v2r8 | Windows | ACCESS CONTROL |
WN10-UR-000100 - The Force shutdown from a remote system user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v2r8 | Windows | ACCESS CONTROL |
WN12-RG-000001 - Standard user accounts must only have Read permissions to the Winlogon registry key. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key - compatability | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-RG-000002 - Standard user accounts must only have Read permissions to the Active Setup\Installed Components registry key. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-RG-000004 - Anonymous access to the registry must be restricted | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000001 - The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000003 - The Act as part of the operating system user right must not be assigned to any groups or accounts. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000007 - The Back up files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000011 - The Create a pagefile user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000013 - The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000023 - The Force shutdown from a remote system user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000035 - The Perform volume maintenance tasks user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000036 - The Profile single process user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN16-00-000190 - Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained - HKEY_LOCAL_MACHINE\SYSTEM | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-DC-000090 - Active Directory Group Policy objects must have proper access control permissions. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-DC-000100 - The Active Directory Domain Controllers Organizational Unit (OU) object must have the proper access control permissions. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-MS-000310 - Remote calls to the Security Account Manager (SAM) must be restricted to Administrators. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000010 - The Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000070 - The Back up files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000080 - The Create a pagefile user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000090 - The Create a token object user right must not be assigned to any groups or accounts. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000100 - The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000110 - The Create permanent shared objects user right must not be assigned to any groups or accounts. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000130 - The Debug programs user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000220 - The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000270 - The Modify firmware environment values user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000280 - The Perform volume maintenance tasks user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN16-UR-000300 - The Restore files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r7 | Windows | ACCESS CONTROL |
WN19-DC-000350 - Windows Server 2019 Add workstations to domain user right must only be assigned to the Administrators group on domain controllers. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-MS-000010 - Windows Server 2019 must only allow Administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-MS-000060 - Windows Server 2019 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems - SAM to Administrators on domain-joined member servers and standalone systems. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-MS-000130 - Windows Server 2019 'Enable computer and user accounts to be trusted for delegation' user right must not be assigned to any groups or accounts on domain-joined member servers and standalone or nondomain-joined systems - Enable computer and user accounts to be trusted for delegation user right must not be assigned to any groups or accounts on domain-joined member servers and standalone or nondomain-joined systems. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000010 - Windows Server 2019 Access Credential Manager as a trusted caller user right must not be assigned to any groups or accounts. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000060 - Windows Server 2019 Create a token object user right must not be assigned to any groups or accounts. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000090 - Windows Server 2019 Create symbolic links user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000100 - Windows Server 2019 Debug programs: user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000110 - Windows Server 2019 Force shutdown from a remote system user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000140 - Windows Server 2019 Increase scheduling priority: user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000180 - Windows Server 2019 Modify firmware environment values user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000190 - Windows Server 2019 Perform volume maintenance tasks user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |
WN19-UR-000200 - Windows Server 2019 Profile single process user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v2r8 | Windows | ACCESS CONTROL |