Item Search

NameAudit NamePluginCategory
APPNET0060 - Remoting Services HTTP channels must utilize authentication and encryption - applicationsDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

APPNET0060 - Remoting Services HTTP channels must utilize authentication and encryption - machineDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

APPNET0062 - The .NET CLR must be configured to use FIPS approved encryption modules - machineDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI014 - The IE TLS parameter must be set correctly.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO189 - Encryption type for password protected Open XML files.DISA STIG OfficeSystem 2007 v4r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO190 - Set encryption type for password protected Office 97 thru Office 2003 files - XP installed and Office 2007 SP2 installedDISA STIG OfficeSystem 2007 v4r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO190 - Set encryption type for password protected Office 97 thru Office 2003 files - XP not installed and Office 2007 SP2 not installedDISA STIG OfficeSystem 2007 v4r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO260 - Outlook - Enable messages formats are set to use SMime.DISA STIG Office 2007 Outlook v4r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

HIPAA 164.312(a)(2)(iv) - Encryption and Decryption (A)HIPAA Windows AuditWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - HTTPSDISA STIG Juniper Infrastructure Router V8R27Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - other servicesDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - SSH ciphersDISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - SSH macsDISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be established using secure protocols with FIPS 140-2 modules - SSH macsDISA STIG Juniper Perimeter Router V8R32Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 - 'ssh algorithm encryption'DISA STIG Cisco L2 Switch v8r26Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 - 'ssh algorithm mac'DISA STIG Cisco L2 Switch v8r26Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip http secure-server'DISA STIG Cisco Infrastructure Router v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip http secure-server'DISA STIG Cisco L2 Switch V8R27Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip http secure-server'DISA STIG Cisco Perimeter Router and L3 Switch v8r31Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip scp secure-server'DISA STIG Cisco Perimeter Router v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip scp secure-server'DISA STIG Cisco L2 Switch v8r26Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip scp secure-server'DISA STIG Cisco L2 Switch V8R27Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ip scp secure-server'DISA STIG Cisco Perimeter L3 Switch v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm encryption'DISA STIG Cisco Perimeter L3 Switch v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm encryption'DISA STIG Cisco Infrastructure Router v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm encryption'DISA STIG Cisco Perimeter Router and L3 Switch v8r31Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm encryption'DISA STIG Cisco Perimeter Router v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm mac'DISA STIG Cisco Perimeter Router v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm mac'DISA STIG Cisco Infrastructure L3 Switch v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm mac'DISA STIG Cisco Infrastructure Router v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1638 - Management connections must be secured by FIPS 140-2 -'ssh algorithm mac'DISA STIG Cisco Perimeter Router and L3 Switch v8r31Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - authentication-noneDISA STIG Juniper Infrastructure Router V8R29Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - authentication-noneDISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - privacy-aes128DISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - privacy-aes128DISA STIG Juniper Infrastructure Router V8R27Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - privacy-aes128DISA STIG Juniper Perimeter Router V8R32Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET1660 - The network device must use SNMPv3 Security Model with FIPS 140-2 validated cryptography - privacy-noneDISA STIG Juniper Perimeter Router V8R32Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

WG140 A22 - Private web servers must require certificates issued from a DoD-authorized Certificate Authority.DISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WG145 W22 - The private web server must use an approved DoD certificate validation process. - 'SSLCARevocationFile'DISA STIG Apache Server 2.2 Windows v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG145 W22 - The private web server must use an approved DoD certificate validation process. - 'SSLCARevocationPath'DISA STIG Apache Server 2.2 Windows v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 A22 - A private web server must utilize an approved TLS version - SSLEngineDISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 A22 - A private web server must utilize an approved TLS version - SSLProtocolDISA STIG Apache Site 2.2 Unix v1r11Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 A22 - A private web server must utilize an approved TLS version - SSLProtocolDISA STIG Apache Site 2.2 Unix v1r11 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 A22 - A private web server must utilize an approved TLS version. 'SSLEngine'DISA STIG Apache Site 2.2 Unix v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 IIS6 - A private web server must utilize an approved TLS version. - 'SSL 2.0\Client'DISA STIG IIS 6.0 Site Checklist v6r16Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 IIS6 - A private web server must utilize an approved TLS version. - 'SSL 3.0\Server'DISA STIG IIS 6.0 Site Checklist v6r16Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG342 A22 - Public web servers must use TLS if authentication is required.DISA STIG Apache Site 2.2 Unix v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WG342 A22 - Public web servers must use TLS if authentication is required.DISA STIG Apache Site 2.2 Unix v1r11Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WG342 IIS6 - Public web servers must use TLS if authentication is required. - 'SSL 3.0 Server'DISA STIG IIS 6.0 Site Checklist v6r16Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG342 IIS6 - Public web servers must use TLS if authentication is required. - 'TLS 1.0 Server'DISA STIG IIS 6.0 Site Checklist v6r16Windows

SYSTEM AND COMMUNICATIONS PROTECTION