Item Search

NameAudit NamePluginCategory
APPL-11-002021 - The macOS system must be configured to disable sending diagnostic and usage data to Apple.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002021 - The macOS system must be configured to disable sending diagnostic and usage data to Apple.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-002022 - The macOS system must be configured to disable Remote Apple Events.DISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-11-002022 - The macOS system must be configured to disable Remote Apple Events.DISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-12-002021 - The macOS system must be configured to disable sending diagnostic and usage data to Apple.DISA STIG Apple macOS 12 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-12-002022 - The macOS system must be configured to disable Remote Apple Events.DISA STIG Apple macOS 12 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-13-002021 - The macOS system must be configured to disable sending diagnostic and usage data to Apple.DISA STIG Apple macOS 13 v1r3Unix

CONFIGURATION MANAGEMENT

APPL-13-002022 - The macOS system must be configured to disable Remote Apple Events.DISA STIG Apple macOS 13 v1r3Unix

CONFIGURATION MANAGEMENT

ARST-ND-000340 - The Arista network device must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.DISA STIG Arista MLS EOS 4.2x NDM v1r1Arista

CONFIGURATION MANAGEMENT

CASA-ND-000430 - The Cisco ASA must be configured to prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services - HTTPDISA STIG Cisco ASA NDM v1r6Cisco

CONFIGURATION MANAGEMENT

CASA-ND-000430 - The Cisco ASA must be configured to prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services - TelnetDISA STIG Cisco ASA NDM v1r6Cisco

CONFIGURATION MANAGEMENT

CASA-VN-000160 - The Cisco ASA must be configured to use Internet Key Exchange v2 (IKEv2) for all IPsec security associations - InterfaceDISA STIG Cisco ASA VPN v1r3Cisco

CONFIGURATION MANAGEMENT

CASA-VN-000160 - The Cisco ASA must be configured to use Internet Key Exchange v2 (IKEv2) for all IPsec security associations - IPsec PhaseDISA STIG Cisco ASA VPN v1r3Cisco

CONFIGURATION MANAGEMENT

CASA-VN-000160 - The Cisco ASA must be configured to use Internet Key Exchange v2 (IKEv2) for all IPsec security associations - PolicyDISA STIG Cisco ASA VPN v1r3Cisco

CONFIGURATION MANAGEMENT

CNTR-K8-000920 - The Kubernetes API Server must enforce ports, protocols, and services (PPS) that adhere to the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL).DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000930 - The Kubernetes Scheduler must enforce ports, protocols, and services (PPS) that adhere to the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL).DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000940 - The Kubernetes Controllers must enforce ports, protocols, and services (PPS) that adhere to the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL).DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000950 - The Kubernetes etcd must enforce ports, protocols, and services (PPS) that adhere to the Ports, Protocols, and Services Management Category Assurance List (PPSM CAL).DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

CNTR-K8-000960 - The Kubernetes cluster must use non-privileged host ports for user pods.DISA STIG Kubernetes v1r11Unix

CONFIGURATION MANAGEMENT

EDGE-00-000048 - Supported authentication schemes must be configured.DISA STIG Edge v1r7Windows

CONFIGURATION MANAGEMENT

FGFW-ND-000200 - The FortiGate device must prohibit the use of all unnecessary and/or non-secure functions, ports, protocols, and/or services.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

GEN007020 - The Stream Control Transmission Protocol (SCTP) must be disabled unless required.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN007480 - The Reliable Datagram Sockets (RDS) protocol must be disabled or not installed unless required.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

JUEX-NM-000230 - The Juniper EX switch must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.DISA Juniper EX Series Network Device Management v1r4Juniper

CONFIGURATION MANAGEMENT

MADB-10-003500 - MariaDB must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA MariaDB Enterprise 10.x v1r2 DBMySQLDB

CONFIGURATION MANAGEMENT

MD4X-00-000500 - Unused database components that are integrated in MongoDB and cannot be uninstalled must be disabled.DISA STIG MongoDB Enterprise Advanced 4.x v1r2 OSUnix

CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Remote Apple EventsNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

RHEL-08-040030 - RHEL 8 must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix

CONFIGURATION MANAGEMENT

SHPT-00-000480 - When configuring Central Administration, the port number selected must comply with DoD Ports and Protocol Management (PPSM) program requirements.DISA STIG SharePoint 2010 v1r9Windows

CONFIGURATION MANAGEMENT

SQL2-00-017300 - SQL Server must specifically prohibit or restrict the use of unauthorized functions and services in each instance.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-017400 - SQL Server must support the organizational requirements to specifically prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SYMP-AG-000300 - Symantec ProxySG must be configured to prohibit or restrict the use of network services as defined in the PPSM CAL and vulnerability assessments. - DestinationDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT

SYMP-AG-000300 - Symantec ProxySG must be configured to prohibit or restrict the use of network services as defined in the PPSM CAL and vulnerability assessments. - SourceDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT

SYMP-NM-000220 - Symantec ProxySG must use only approved management services protocols.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

CONFIGURATION MANAGEMENT

UBTU-20-010407 - The Ubuntu operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA STIG Ubuntu 20.04 LTS v1r10Unix

CONFIGURATION MANAGEMENT

VCPG-67-000011 - VMware Postgres must be configured to use the correct port.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

CONFIGURATION MANAGEMENT

WBSP-AS-000980 - The WebSphere Application Server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or servicesDISA IBM WebSphere Traditional 9 STIG v1r1Unix

CONFIGURATION MANAGEMENT

WBSP-AS-000980 - The WebSphere Application Server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or servicesDISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

CONFIGURATION MANAGEMENT

WBSP-AS-000980 - The WebSphere Application Server must prohibit or restrict the use of nonsecure ports, protocols, modules, and/or servicesDISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

CONFIGURATION MANAGEMENT

WN11-00-000120 - The TFTP Client must not be installed on the system.DISA Windows 11 STIG v1r5Windows

CONFIGURATION MANAGEMENT

WN22-00-000330 - Windows Server 2022 must not have the Microsoft FTP service installed unless required by the organization.DISA Windows Server 2022 STIG v1r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000360 - Windows Server 2022 must not have the Telnet Client installed.DISA Windows Server 2022 STIG v1r4Windows

CONFIGURATION MANAGEMENT