Item Search

NameAudit NamePluginCategory
AS24-W1-000590 - The Apache web server must restrict the ability of users to launch denial-of-service (DoS) attacks against other information systems or networks.DISA STIG Apache Server 2.4 Windows Server v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks.DISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000100 - The Cisco switch must have BPDU Guard enabled on all user-facing or untrusted access switch ports - BPDU Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Cisco IOS XE Switch L2S v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000110 - The Cisco switch must have STP Loop Guard enabled - spanning-tree modeDISA STIG Cisco IOS XE Switch L2S v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000140 - The Cisco switch must have IP Source Guard enabled on all user-facing or untrusted access switch ports.DISA STIG Cisco IOS XE Switch L2S v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000150 - The Cisco switch must have Dynamic Address Resolution Protocol (ARP) Inspection (DAI) enabled on all user VLANs.DISA STIG Cisco IOS XE Switch L2S v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001220 - The Cisco router must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards.DISA STIG Cisco IOS Router NDM v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001220 - The Cisco switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards - control-planeDISA STIG Cisco IOS Switch NDM v2r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-001220 - The Cisco switch must be configured to protect against known types of denial-of-service (DoS) attacks by employing organization-defined security safeguards - policy-mapDISA STIG Cisco IOS XE Switch NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000150 - The Cisco router must be configured to have Gratuitous ARP disabled on all external interfaces.DISA STIG Cisco IOS XE Router RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000160 - The Cisco router must be configured to have IP directed broadcast disabled on all interfaces.DISA STIG Cisco IOS XE Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000190 - The Cisco router must be configured to have Internet Control Message Protocol (ICMP) redirect messages disabled on all external interfaces.DISA STIG Cisco IOS XE Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000470 - The Cisco BGP router must be configured to enable the Generalized TTL Security Mechanism (GTSM).DISA STIG Cisco IOS XE Router RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000470 - The Cisco BGP switch must be configured to check whether a single-hop eBGP peer is directly connected.DISA STIG Cisco NX-OS Switch RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000470 - The Cisco BGP switch must be configured to enable the Generalized TTL Security Mechanism (GTSM).DISA STIG Cisco IOS XE Switch RTR v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000510 - The Cisco BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer - neighborDISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000560 - The Cisco BGP router must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.DISA STIG Cisco IOS XE Router RTR v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000560 - The Cisco BGP switch must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks.DISA STIG Cisco NX-OS Switch RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000570 - The Cisco BGP switch must be configured to limit the prefix size on any inbound route advertisement to /24, or the least significant prefixes issued to the customer - denyDISA STIG Cisco NX-OS Switch RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000710 - The Cisco PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco IOS XE Router RTR v2r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000710 - The Cisco PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco IOS-XR Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000710 - The Cisco PE switch must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco NX-OS Switch RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000820 - The Cisco multicast Rendezvous Point (RP) router must be configured to limit the multicast forwarding cache so that its resources are not saturated by managing an overwhelming number of Protocol Independent Multicast (PIM) and Multicast Source Discovery Protocol (MSDP) source-active entries.DISA STIG Cisco IOS XE Router RTR v2r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000890 - The Cisco multicast Designated Router (DR) must be configured to set the shortest-path tree (SPT) threshold to infinity to minimalize source-group (S, G) state within the multicast topology where Any Source Multicast (ASM) is deployed.DISA STIG Cisco IOS XE Router RTR v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000180 - Exchange Receive connectors must control the number of recipients per message.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000270 - The Exchange Global Recipient Count Limit must be set.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-ED-000290 - Exchange Receive connectors must control the number of recipients chunked on a single message.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-LT-000215 - The BIG-IP Core implementation must be configured to protect against known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis when providing content filtering to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003612 - The system must be configured to use TCP syncookies when experiencing a TCP SYN flood.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-L2-000040 - The Juniper EX switch must be configured to manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.DISA Juniper EX Series Layer 2 Switch v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000340 - The Juniper PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000350 - The Juniper PE router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS DODIN Technical Profile.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000500 - The Juniper perimeter router must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding (uRPF).DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O112-BP-025600 - Network access to the DBMS must be restricted to authorized personnel - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O112-BP-025600 - Network access to the DBMS must be restricted to authorized personnel - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C3-019200 - The DBMS must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C3-019200 - The DBMS must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-019100 - The DBMS must protect against or limit the effects of organization-defined types of Denial of Service (DoS) attacks.DISA STIG Oracle 12c v2r2 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-040000 - The Oracle Linux operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA Oracle Linux 7 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Protecting Your System from MalwareTenable AWS Best Practice Auditamazon_aws

SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-040000 - The Red Hat Enterprise Linux operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA Red Hat Enterprise Linux 7 STIG v3r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-040000 - The Red Hat Enterprise Linux operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA Red Hat Enterprise Linux 7 STIG v3r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000185 - A secondary SharePoint site collection administrator must be defined when creating a new site collection.DISA STIG SharePoint 2013 v1r8Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

VCFL-67-000001 - vSphere Client must limit the amount of time that each TCP connection is kept alive.DISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000007 - The system must limit the effects of information-flooding types of Denial of Service (DoS) attacks.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-08-000236 - Oracle WebLogic must protect against or limit the effects of HTTP types of Denial of Service (DoS) attacks.Oracle WebLogic Server 12c Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001480 - The WebSphere Application servers with an RMF categorization of high must be in a high-availability (HA) cluster.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001480 - The WebSphere Application servers with an RMF categorization of high must be in a high-availability (HA) cluster.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001480 - The WebSphere Application servers with an RMF categorization of high must be in a high-availability (HA) cluster.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000220 - Turning off File Explorer heap termination on corruption must be disabled.DISA Windows 10 STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION