Item Search

NameAudit NamePluginCategory
3.5.3.2.3 Ensure iptables rules exist for all open ports - PPSM CLSA and vulnerability assessments.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

5.117 - Users must be prevented from connecting using Terminal Services.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL

AIX7-00-001137 - AIX must be able to control the ability of remote login for users.DISA STIG AIX 7.x v2r6Unix

ACCESS CONTROL

AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Server v2r5Unix

ACCESS CONTROL

Big Sur - Control remote access methodsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Catalina - Control remote access methodsNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL

F5BI-LT-000153 - The BIG-IP Core implementation providing intermediary services for remote access communications traffic must control remote access methods to virtual servers.DISA F5 BIG-IP Local Traffic Manager 11.x STIG v2r1F5

ACCESS CONTROL

GEN001000 - Remote consoles must be disabled or protected from unauthorized access.DISA STIG Solaris 10 X86 v2r2Unix

ACCESS CONTROL

GEN001000 - Remote consoles must be disabled or protected from unauthorized access.DISA STIG Solaris 10 SPARC v2r2Unix

ACCESS CONTROL

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 X86 v2r2Unix

ACCESS CONTROL

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 SPARC v2r2Unix

ACCESS CONTROL

IISW-SV-000141 - Remote access to the IIS 8.5 web server must follow access policy or work in conjunction with enterprise tools designed to enforce policy requirements.DISA IIS 8.5 Server v2r3Windows

ACCESS CONTROL

KNOX-07-005100 - The Samsung must be configured to enable authentication of hotspot connections to the device using a preshared key.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

ACCESS CONTROL

KNOX-07-005100 - The Samsung must be configured to enable authentication of hotspot connections to the device using a preshared key.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

ACCESS CONTROL

Monterey - Control remote access methodsNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

OH12-1X-000031 - OHS must have the Order, Allow, and Deny directives set within the Directory directives set to restrict inbound connections from nonsecure zones.DISA STIG Oracle HTTP Server 12.1.3 v2r1Unix

ACCESS CONTROL

OH12-1X-000033 - OHS must have the Order, Allow, and Deny directives set within the Location directives set to restrict inbound connections from nonsecure zones.DISA STIG Oracle HTTP Server 12.1.3 v2r1Unix

ACCESS CONTROL

OL08-00-040090 - An OL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems - --info-zoneDISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-040090 - An OL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems - --info-zoneDISA Oracle Linux 8 STIG v1r4Unix

ACCESS CONTROL

OL08-00-040090 - An OL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems - --stateDISA Oracle Linux 8 STIG v1r4Unix

ACCESS CONTROL

OL08-00-040090 - An OL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems - --stateDISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-040100 - A firewall must be installed on OL 8.DISA Oracle Linux 8 STIG v1r4Unix

ACCESS CONTROL

OL08-00-040100 - A firewall must be installed on OL 8.DISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

OL08-00-040101 - A firewall must be active on OL 8.DISA Oracle Linux 8 STIG v1r4Unix

ACCESS CONTROL

OL08-00-040101 - A firewall must be active on OL 8.DISA Oracle Linux 8 STIG v1r2Unix

ACCESS CONTROL

PHTN-67-000055 - The Photon operating system must configure sshd with a specific ListenAddress.DISA STIG VMware vSphere 6.7 Photon OS v1r3Unix

ACCESS CONTROL

RHEL-08-040090 - A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems - --info-zoneDISA Red Hat Enterprise Linux 8 STIG v1r8Unix

ACCESS CONTROL

RHEL-08-040090 - A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems - --stateDISA Red Hat Enterprise Linux 8 STIG v1r8Unix

ACCESS CONTROL

RHEL-08-040100 - A firewall must be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v1r8Unix

ACCESS CONTROL

RHEL-08-040101 - A firewall must be active on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v1r8Unix

ACCESS CONTROL

SLES-15-010220 - The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments - activeDISA SLES 15 STIG v1r6Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SLES-15-010220 - The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments - enabledDISA SLES 15 STIG v1r6Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

SLES-15-010220 - The SUSE operating system must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services as defined in the Ports, Protocols, and Services Management (PPSM) Category Assignments List (CAL) and vulnerability assessments - rulesDISA SLES 15 STIG v1r6Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

UBTU-16-030030 - An application firewall must be installed.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

UBTU-18-010023 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.DISA STIG Ubuntu 18.04 LTS v2r8Unix

ACCESS CONTROL

UBTU-20-010433 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.DISA STIG Ubuntu 20.04 LTS v1r5Unix

ACCESS CONTROL

UBTU-20-010434 - The Ubuntu operating system must enable and run the uncomplicated firewall(ufw) - activeDISA STIG Ubuntu 20.04 LTS v1r5Unix

ACCESS CONTROL

UBTU-20-010434 - The Ubuntu operating system must enable and run the uncomplicated firewall(ufw) - enabledDISA STIG Ubuntu 20.04 LTS v1r5Unix

ACCESS CONTROL

VCRP-67-000008 - The rhttproxy must exclusively use the HTTPS protocol for client connections - certificateDISA STIG VMware vSphere 6.7 RhttpProxy v1r2Unix

ACCESS CONTROL

VCRP-67-000008 - The rhttproxy must exclusively use the HTTPS protocol for client connections - privateKeyDISA STIG VMware vSphere 6.7 RhttpProxy v1r2Unix

ACCESS CONTROL

VCRP-67-000008 - The rhttproxy must exclusively use the HTTPS protocol for client connections - vecsServerNameDISA STIG VMware vSphere 6.7 RhttpProxy v1r2Unix

ACCESS CONTROL

WBSP-AS-000130 - The WebSphere Application Server administrative security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000130 - The WebSphere Application Server administrative security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000130 - The WebSphere Application Server administrative security must be enabled.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WN11-UR-000090 - The 'Deny log on through Remote Desktop Services' user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems - Deny log on through Remote Desktop Services user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.DISA Windows 11 STIG v1r2Windows

ACCESS CONTROL

WN12-CC-000132 - Users must be prevented from mapping local COM ports and redirecting data from the Remote Desktop Session Host to local COM ports. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r4Windows

ACCESS CONTROL

WN12-CC-000134 - The system must be configured to ensure smart card devices can be redirected to the Remote Desktop session. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 MS STIG v3r5Windows

ACCESS CONTROL

WN16-DC-000410 - The Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2016 STIG v2r4Windows

ACCESS CONTROL

WN22-DC-000410 - Windows Server 2022 Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2022 STIG v1r1Windows

ACCESS CONTROL

WN22-MS-000120 - Windows Server 2022 Deny log on through Remote Desktop Services user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.DISA Windows Server 2022 STIG v1r1Windows

ACCESS CONTROL