1.001 - Physical security of the Automated Information System (AIS) does not meet DISA requirements. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
1.013 - System information backups are not created, updated, and protected according to DISA requirements. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
1.016 - Security configuration tools or equivalent processes must be used to configure and maintain platforms for security compliance. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.004 - Secure Removable Media - CD-ROM | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.5.1.4 Ensure firewalld service enabled and running - installed | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
3.007 - The system allows shutdown from the logon dialog box. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.044 - The computer account password is prevented from being reset. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.127 - IPSec Exemptions are limited. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.2.1.5 Ensure rsyslog is configured to send logs to a remote log host | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Allow log on locally | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Backup files and directories | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Change the time zone | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Profile system performance | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Shut down the system | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.036 - The use of local accounts with blank passwords is not restricted to console logons only. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.045 - Domain Controller authentication is not required to unlock the workstation. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.003 - Booting into alternate operating systems is permitted. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.3.8 Ensure SSH X11 forwarding is disabled | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
5.045 - Terminal Services is not configured to delete temporary folders. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.050 - IPv6 must be disabled until a deliberate transition strategy has been implemented. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.230 - Online Assistance - Untrusted Content | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.248 - Media Player - First Use Dialog Boxes | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.253 - User Network Sharing | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
6.2.21 Ensure local interactive user is a member of the group owner. | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
6.2.25 Ensure users' dot files have 0740 or less set. | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | CONFIGURATION MANAGEMENT |
Big Sur - Enable Firmware Password | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Big Sur - Secure User's Home Folders | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Disable Password Hints | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
Catalina - Enable Firmware Password | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Enable Firmware Password | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Secure User's Home Folders | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Catalina - Secure User's Home Folders | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
DTOO140 - Excel - Automatic republish to web pages must be disallowed. | DISA STIG Office 2010 Excel v1r11 | Windows | CONFIGURATION MANAGEMENT |
DTOO218 - Outlook - Level of calendar details that a user can publish must be restricted. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO221 - Outlook - Junk Mail UI must be configured. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO224 - Outlook - Recipients of sent email must be unable to be added to the safe sender's list. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO229 - Outlook - Outlook must be enforced as the default email, calendar, and contacts program. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO270 - Outlook - External content and pictures in HTML eMail must be displayed. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO314 - Outlook - Default message format must be set to use Plain Text. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
DTOO425 - Text in Outlook that represents Internet and network paths must not be automatically turned into hyperlinks. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
Monterey - Configure Gatekeeper to Disallow End User Override | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure Gatekeeper to Disallow End User Override | NIST macOS Monterey v1.0.0 - All Profiles | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure Sudoers to Authenticate Users on a Per -tty Basis | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
Monterey - Configure Sudoers to Authenticate Users on a Per -tty Basis | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
Monterey - Configure Sudoers to Authenticate Users on a Per -tty Basis | NIST macOS Monterey v1.0.0 - All Profiles | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
Monterey - Disable Unattended or Automatic Logon to the System | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
WINCC-000029 - Group Policies must be refreshed in the background if the user is logged on. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
WINER-000009 - The system must be configured to send error reports on TCP port 1232. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
WINFW-000001 - A host-based firewall must be installed and enabled on the system. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
WINFW-000100 - Inbound exceptions to the firewall on domain workstations must only allow authorized management systems. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |