3.042 - Outgoing secure channel traffic will be signed when possible. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.043 - Outgoing secure channel traffic is not encrypted when possible. | DISA Windows 7 STIG v1r32 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.043 - Outgoing secure channel traffic is not encrypted when possible. | DISA Windows Server 2008 DC STIG v6r47 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.045 - The Windows SMB client is not enabled to perform SMB packet signing when possible. | DISA Windows Server 2008 MS STIG v6r46 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.045 - The Windows SMB client is not enabled to perform SMB packet signing when possible. | DISA Windows 7 STIG v1r32 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.045 - The Windows SMB client is not enabled to perform SMB packet signing when possible. | DISA Windows Server 2008 DC STIG v6r47 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.046 - The Windows SMB server is not enabled to perform SMB packet signing when possible. | DISA Windows Server 2008 DC STIG v6r47 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.046 - The Windows SMB server is not enabled to perform SMB packet signing when possible. | DISA Windows Server 2008 MS STIG v6r46 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.115 - The Windows SMB server is not enabled to always perform SMB packet signing. | DISA Windows 7 STIG v1r32 | Windows | IDENTIFICATION AND AUTHENTICATION |
4.044 - The system is not configured to require a strong session key. | DISA Windows 7 STIG v1r32 | Windows | IDENTIFICATION AND AUTHENTICATION |
AOSX-15-002062 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - DisabledPreferencePanes | DISA STIG Apple Mac OSX 10.15 v1r8 | Unix | |
AS24-U1-000900 - The Apache web server must remove all export ciphers to protect the confidentiality and integrity of transmitted information. | DISA STIG Apache Server 2.4 Unix Server v2r7 Middleware | Unix | |
ESXI-06-000050 - The system must protect the confidentiality and integrity of transmitted information by protecting IP based management traffic. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-67-000050 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic. | DISA STIG VMware vSphere 6.7 ESXi v1r1 | VMware | |
EX16-ED-000680 - Exchange internal Receive connectors must require encryption. | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r3 | Windows | |
EX16-ED-000680 - Exchange internal Receive connectors must require encryption. | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r4 | Windows | |
EX16-ED-000690 - Exchange internal Send connectors must require encryption - TlsAuthLevel | DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r4 | Windows | |
GEN007841 - Wireless network adapters must be disabled. | DISA STIG HP-UX 11.31 v1r19 | Unix | ACCESS CONTROL |
GEN007841 - Wireless network adapters must be disabled. | DISA STIG AIX 6.1 v1r13 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
IIST-SI-000244 - IIS 10.0 website session IDs must be sent to the client using TLS. | DISA IIS 10.0 Site v2r7 | Windows | |
IIST-SI-000246 - Cookies exchanged between the IIS 10.0 website and the client must have cookie properties set to prohibit client-side scripts from reading the cookie data - requireSSL | DISA IIS 10.0 Site v2r7 | Windows | |
IIST-SV-000152 - IIS 10.0 web server session IDs must be sent to the client using TLS. | DISA IIS 10.0 Server v2r9 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - SSL 2.0 | DISA IIS 10.0 Server v2r8 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - SSL 2.0 Enabled | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - SSL 2.0 Enabled | DISA IIS 10.0 Server v2r8 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.0 | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.0 Enabled | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.0 Enabled | DISA IIS 10.0 Server v2r8 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.1 | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.1 Enabled | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.1 Enabled | DISA IIS 10.0 Server v2r8 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.2 | DISA IIS 10.0 Server v2r5 | Windows | |
IIST-SV-000153 - An IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version - TLS 1.2 | DISA IIS 10.0 Server v2r8 | Windows | |
IIST-SV-000154 - The IIS 10.0 web server must maintain the confidentiality of controlled information during transmission through the use of an approved Transport Layer Security (TLS) version. | DISA IIS 10.0 Server v2r9 | Windows | |
IISW-SI-000244 - IIS 8.5 website session IDs must be sent to the client using TLS. | DISA IIS 8.5 Site v2r5 | Windows | |
IISW-SI-000246 - Cookies exchanged between the IIS 8.5 website and the client must use SSL/TLS, have cookie properties set to prohibit client-side scripts from reading the cookie data and must not be compressed - requireSSL | DISA IIS 8.5 Site v2r5 | Windows | |
IISW-SV-000152 - IIS 8.5 web server session IDs must be sent to the client using TLS. | DISA IIS 8.5 Server v2r5 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - SSL 2.0 Enabled | DISA IIS 8.5 Server v2r5 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - SSL 3.0 Enabled | DISA IIS 8.5 Server v2r3 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.1 | DISA IIS 8.5 Server v2r3 | Windows | |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - TLS 1.2 | DISA IIS 8.5 Server v2r3 | Windows | |
OH12-1X-000310 - OHS must have the SSLEngine, SSLProtocol, SSLWallet directives enabled and configured to prevent unauthorized disclosure of information during transmission - SSLEngine | DISA STIG Oracle HTTP Server 12.1.3 v2r1 | Unix | |
OH12-1X-000313 - OHS must have the WLSSLWallet directive enabled to prevent unauthorized disclosure of information during transmission. | DISA STIG Oracle HTTP Server 12.1.3 v2r1 | Unix | |
OH12-1X-000322 - OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - SSLProtocol | DISA STIG Oracle HTTP Server 12.1.3 v2r1 | Unix | |
SOL-11.1-060070 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 X86 v2r10 | Unix | |
SOL-11.1-060100 - The operating system must protect the confidentiality of transmitted information. | DISA STIG Solaris 11 SPARC v2r2 | Unix | |
SOL-11.1-060100 - The operating system must protect the confidentiality of transmitted information. | DISA STIG Solaris 11 SPARC v2r7 | Unix | |
SOL-11.1-060190 - The operating system must protect the integrity of transmitted information. | DISA STIG Solaris 11 SPARC v2r10 | Unix | |
UBTU-18-010521 - The Ubuntu operating system must disable all wireless network adapters. | DISA STIG Ubuntu 18.04 LTS v2r13 | Unix | |
WDNS-SC-000028 - The Windows 2012 DNS Server must protect the integrity of transmitted information. | DISA Microsoft Windows 2012 Server DNS STIG v2r6 | Windows | |