Item Search

NameAudit NamePluginCategory
APPL-14-003080 - The macOS system must disable accounts after 35 days of inactivity.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

APPL-15-003080 - The macOS system must disable accounts after 35 days of inactivity.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL

JUEX-NM-000640 - The Juniper EX switch must be configured to use an authentication server for the purpose of authenticating users prior to granting administrative access.DISA Juniper EX Series Network Device Management v2r1Juniper

CONFIGURATION MANAGEMENT

JUSX-DM-000095 - The Juniper SRX Services Gateway must be configured to use an authentication server to centrally manage authentication and logon settings for remote and nonlocal access.DISA Juniper SRX Services Gateway NDM v3r2Juniper

CONFIGURATION MANAGEMENT

OL08-00-020260 - The OL 8 system-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

OL08-00-020261 - The OL 8 password-auth file must disable access to the system for account identifiers (individuals, groups, roles, and devices) with 35 days of inactivity.DISA Oracle Linux 8 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-08-020260 - RHEL 8 account identifiers (individuals, groups, roles, and devices) must be disabled after 35 days of inactivity.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-09-411050 - RHEL 9 must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-020050 - The SUSE operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity after password expiration.DISA SLES 15 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL

SOL-11.1-040280 - User accounts must be locked after 35 days of inactivity.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL

UBTU-20-010409 - The Ubuntu operating system must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.DISA STIG Ubuntu 20.04 LTS v2r1Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-22-411035 - Ubuntu 22.04 LTS must disable account identifiers (individuals, groups, roles, and devices) after 35 days of inactivity.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

IDENTIFICATION AND AUTHENTICATION

VCSA-80-000059 The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.DISA VMware vSphere 8.0 vCenter STIG v2r1VMware

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

WN10-00-000065 - Unused accounts must be disabled or removed from the system after 35 days of inactivity.DISA Windows 10 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN11-00-000065 - Unused accounts must be disabled or removed from the system after 35 days of inactivity.DISA Windows 11 STIG v2r2Windows

AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

WN19-00-000190 - Windows Server 2019 outdated or unused accounts must be removed or disabled.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000190 - Windows Server 2022 outdated or unused accounts must be removed or disabled.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION