3.045 - The Windows SMB client will be enabled to perform SMB packet signing when possible. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.046 - The Windows SMB server is not enabled to perform SMB packet signing when possible. | DISA Windows 7 STIG v1r32 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.113 - Outgoing secure channel traffic is not encrypted or signed. | DISA Windows Server 2008 DC STIG v6r47 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.113 - Outgoing secure channel traffic is not encrypted or signed. | DISA Windows Server 2008 MS STIG v6r46 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.113 - Outgoing secure channel traffic will be encrypted or signed. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.114 - The Windows Server SMB client is not enabled to always perform SMB packet signing. | DISA Windows Server 2008 DC STIG v6r47 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.114 - The Windows Server SMB client is not enabled to always perform SMB packet signing. | DISA Windows Server 2008 MS STIG v6r46 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.115 - The Windows SMB server will be enabled to always perform SMB packet signing. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | IDENTIFICATION AND AUTHENTICATION |
4.044 - The system will be configured to require a strong session key. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | IDENTIFICATION AND AUTHENTICATION |
AOSX-15-002062 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - HiddenPreferencePanes | DISA STIG Apple Mac OSX 10.15 v1r8 | Unix | |
AS24-U1-000870 - Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data - Session | DISA STIG Apache Server 2.4 Unix Server v2r6 | Unix | |
AS24-U1-000870 - Cookies exchanged between the Apache web server and the client, such as session cookies, must have cookie properties set to prohibit client-side scripts from reading the cookie data - SessionCookieName | DISA STIG Apache Server 2.4 Unix Server v2r6 | Unix | |
AS24-U1-000900 - The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. | DISA STIG Apache Server 2.4 Unix Server v2r6 Middleware | Unix | |
AS24-U1-000900 - The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. | DISA STIG Apache Server 2.4 Unix Server v2r7 | Unix | |
AS24-U1-000900 - The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. | DISA STIG Apache Server 2.4 Unix Server v2r6 | Unix | |
ESXI-06-000048 - The system must protect the confidentiality and integrity of transmitted information by isolating vMotion traffic. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-67-000052 - The ESXi host must protect the confidentiality and integrity of transmitted information by using different TCP/IP stacks where possible. | DISA STIG VMware vSphere 6.7 ESXi v1r1 | VMware | |
EX16-ED-000690 - Exchange internal Send connectors must require encryption - DomainSecureEnabled | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r3 | Windows | |
EX16-ED-000690 - Exchange internal Send connectors must require encryption - DomainSecureEnabled | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r4 | Windows | |
EX16-ED-000690 - Exchange internal Send connectors must require encryption - TlsAuthLevel | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r3 | Windows | |
IIST-SI-000244 - IIS 10.0 website session IDs must be sent to the client using TLS. | DISA IIS 10.0 Site v2r5 | Windows | |
IIST-SI-000246 - Cookies exchanged between the IIS 10.0 website and the client must have cookie properties set to prohibit client-side scripts from reading the cookie data - compressionEnabled | DISA IIS 10.0 Site v2r5 | Windows | |
IIST-SV-000152 - IIS 10.0 web server session IDs must be sent to the client using TLS. | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version | DISA IIS 10.0 Server v2r9 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - SSL 3.0 | DISA IIS 10.0 Server v2r5 | Windows | |
IISW-SI-000246 - Cookies exchanged between the IIS 8.5 website and the client must use SSL/TLS, have cookie properties set to prohibit client-side scripts from reading the cookie data and must not be compressed | DISA IIS 8.5 Site v2r8 | Windows | |
IISW-SI-000246 - Cookies exchanged between the IIS 8.5 website and the client must use SSL/TLS, have cookie properties set to prohibit client-side scripts from reading the cookie data and must not be compressed - compressionEnabled | DISA IIS 8.5 Site v2r7 | Windows | |
IISW-SI-000246 - Cookies exchanged between the IIS 8.5 website and the client must use SSL/TLS, have cookie properties set to prohibit client-side scripts from reading the cookie data and must not be compressed - compressionEnabled | DISA IIS 8.5 Site v2r5 | Windows | |
IISW-SI-000246 - Cookies exchanged between the IIS 8.5 website and the client must use SSL/TLS, have cookie properties set to prohibit client-side scripts from reading the cookie data and must not be compressed - requireSSL | DISA IIS 8.5 Site v2r7 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.0 | DISA IIS 8.5 Server v2r5 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.0 | DISA IIS 8.5 Server v2r3 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.0 Enabled | DISA IIS 8.5 Server v2r5 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.1 Enabled | DISA IIS 8.5 Server v2r5 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.1 Enabled | DISA IIS 8.5 Server v2r3 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.2 | DISA IIS 8.5 Server v2r5 | Windows | |
IISW-SV-000154 - A web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version. | DISA IIS 8.5 Server v2r3 | Windows | |
OH12-1X-000310 - OHS must have the SSLEngine, SSLProtocol, SSLWallet directives enabled and configured to prevent unauthorized disclosure of information during transmission - SSLWallet | DISA STIG Oracle HTTP Server 12.1.3 v2r1 | Unix | |
OL07-00-040310 - The Oracle Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission. | DISA Oracle Linux 7 STIG v2r7 | Unix | |
OL07-00-040310 - The Oracle Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission. | DISA Oracle Linux 7 STIG v2r9 | Unix | |
OL07-00-040310 - The Oracle Linux operating system must be configured so that all networked systems use SSH for confidentiality and integrity of transmitted and received information as well as information during preparation for transmission. | DISA Oracle Linux 7 STIG v2r12 | Unix | |
SOL-11.1-060070 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 X86 v2r8 | Unix | |
SOL-11.1-060100 - The operating system must protect the confidentiality of transmitted information. | DISA STIG Solaris 11 X86 v2r8 | Unix | |
SOL-11.1-060190 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 SPARC v2r9 | Unix | |
SOL-11.1-060190 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 X86 v2r7 | Unix | |
SOL-11.1-060190 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 X86 v2r8 | Unix | |
SOL-11.1-060190 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 X86 v2r9 | Unix | |
SOL-11.1-060190 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 SPARC v2r7 | Unix | |
SPLK-CL-000070 - Splunk Enterprise must use SSL to protect the confidentiality and integrity of transmitted information. | DISA STIG Splunk Enterprise 7.x for Windows v2r4 REST API | Splunk | |
UBTU-18-010521 - The Ubuntu operating system must disable all wireless network adapters. | DISA STIG Ubuntu 18.04 LTS v2r14 | Unix | |
Wireless network adapters must be disabled | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL |