Item Search

NameAudit NamePluginCategory
APPNET0075 - Disable TLS RC4 cipher in .NetDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

APPNET0075 - Disable TLS RC4 cipher in .Net - Wow6432NodeDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000780 - The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.DISA STIG Apache Server 2.4 Windows Site v1r3Windows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SSLDISA STIG IBM DB2 v10.5 LUW v1r4 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network ports and services deemed by the organization to be nonsecure - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r3 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network ports and services deemed by the organization to be nonsecure - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r3 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network ports and services deemed by the organization to be nonsecure - SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r3 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network protocols, and services deemed by the organization to be nonsecure - SSLDISA STIG IBM DB2 v10.5 LUW v1r3 OS WindowsWindows

CONFIGURATION MANAGEMENT

DTBC-0074 - Use of the QUIC protocol must be disabled.DISA STIG Google Chrome v2r6Windows
DTBC-0074 - Use of the QUIC protocol must be disabled.DISA STIG Google Chrome v2r4Windows
DTBC-0074 - Use of the QUIC protocol must be disabled.DISA STIG Google Chrome v2r8Windows
EPAS-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.EnterpriseDB PostgreSQL Advanced Server OS Linux v1r1Unix
EX13-CA-000130 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v1r2Windows

CONFIGURATION MANAGEMENT

EX13-CA-000130 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v1r3Windows

CONFIGURATION MANAGEMENT

EX13-EG-000305 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5Windows
EX13-EG-000305 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

CONFIGURATION MANAGEMENT

EX13-MB-000300 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

CONFIGURATION MANAGEMENT

IISW-SI-000239 - The IIS 8.5 websites must utilize ports, protocols, and services according to PPSM guidelines.DISA IIS 8.5 Site v1r9Windows

CONFIGURATION MANAGEMENT

MADB-10-008100 - MariaDB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA MariaDB Enterprise 10.x v1r2 DBMySQLDB
MADB-10-008100 - MariaDB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA MariaDB Enterprise 10.x v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidanceDISA Oracle MySQL 8.0 v1r4 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - local socket/pipeDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - port settingsDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - portsDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - socketDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA Oracle MySQL 8.0 v1r5 DBMySQLDB
SQL4-00-034200 - SQL Server must disable communication protocols not required for operation.DISA STIG SQL Server 2014 Instance OS Audit v1r10Windows
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r3Unix
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r2Unix
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r1Unix
VCFL-67-000028 - vSphere Client must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 Virgo Client v1r1Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r1Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r2Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r1Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - localhost.httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - localhost.httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 UI Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 UI Tomcat v1r2Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 UI Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 UI Tomcat v1r2Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - proxyDISA STIG VMware vSphere 6.7 UI Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - proxyDISA STIG VMware vSphere 6.7 UI Tomcat v1r2Unix