Item Search

NameAudit NamePluginCategory
5.043 - Terminal Services is not configured with the client connection encryption set to the required level.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, MAINTENANCE

AIOS-12-001300 - Apple iOS must not include applications with the following characteristics: Siri when the device is locked.AirWatch - DISA Apple iOS 12 v2r1MDM

ACCESS CONTROL

AIOS-12-001300 - Apple iOS must not include applications with the following characteristics: Siri when the device is locked.MobileIron - DISA Apple iOS 12 v2r1MDM

ACCESS CONTROL

AIX7-00-002104 - The AIX SSH server must use SSH Protocol 2.DISA STIG AIX 7.x v2r9Unix

ACCESS CONTROL

CISC-ND-001140 - The Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco IOS XE Router NDM v3r1Cisco

ACCESS CONTROL

CISC-ND-001140 - The Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco NX-OS Switch NDM v3r1Cisco

ACCESS CONTROL

CISC-ND-001140 - The Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco IOS Switch NDM v3r1Cisco

ACCESS CONTROL

CISC-ND-001140 - The Cisco switch must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco IOS XE Switch NDM v3r1Cisco

ACCESS CONTROL

ESXI-06-000010 - The VMM must use DoD-approved encryption to protect the confidentiality of remote access sessions.DISA STIG VMware vSphere 6.x ESXi OS v1r5Unix

ACCESS CONTROL

ESXI-06-000011 - The SSH daemon must be configured to use only the SSHv2 protocol.DISA STIG VMware vSphere 6.x ESXi OS v1r5Unix

ACCESS CONTROL

ESXI-67-000010 - The ESXi host SSH daemon must use DoD-approved encryption to protect the confidentiality of remote access sessions.DISA STIG VMware vSphere 6.7 ESXi OS v1r3Unix

ACCESS CONTROL

EX13-CA-000010 - Exchange must use Encryption for OWA access.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX13-CA-000015 - Exchange must have Forms-based Authentication disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX16-MB-002910 - Exchange must use encryption for Outlook Web App (OWA) access.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

ACCESS CONTROL

GEN003820 - The rsh daemon must not be running.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003820 - The rsh daemon must not be running.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN003820 - The rsh daemon must not be running.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN003820 - The rsh daemon must not be running.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003820 - The rsh daemon must not be running.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN003830 - The rlogind service must not be running.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003830 - The rlogind service must not be running.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN003830 - The rlogind service must not be running.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN003830 - The rlogind service must not be running.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003830 - The rlogind service must not be running.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN005307 - SNMP must require the use of a FIPS 140-2 encryption algorithm for protecting the privacy of SNMP messages.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005307 - The SNMP service must require the use of a FIPS 140-2 approved encryption algorithm for protecting the privacy of SNMP messages.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN005505 - The operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN005505 - The operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN005505 - The operating system must implement DoD-approved encryption to protect the confidentiality of SSH connections.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

IIST-SI-000203 - A private IIS 10.0 website must only accept Secure Socket Layer (SSL) connections.DISA IIS 10.0 Site v2r9Windows

ACCESS CONTROL

IIST-SI-000204 - A public IIS 10.0 website must only accept Secure Socket Layer (SSL) connections when authentication is required.DISA IIS 10.0 Site v2r9Windows

ACCESS CONTROL

IISW-SI-000204 - A public IIS 8.5 website must only accept Secure Socket Layer connections when authentication is required.DISA IIS 8.5 Site v2r9Windows

ACCESS CONTROL

JUNI-ND-001130 - The Juniper router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Juniper Router NDM v3r1Juniper

ACCESS CONTROL

OH12-1X-000009 - OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to encrypt remote connections in accordance with the categorization of data hosted by the web server - SSLWalletDISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

OH12-1X-000010 - OHS must have the SSLCipherSuite directive enabled to encrypt remote connections in accordance with the categorization of data hosted by the web server.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

OL6-00-000216 - The rexecd service must not be running - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

RHEL-06-000214 - The rshd service must not be running.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

VCFL-67-000005 - vSphere Client must be configured with FIPS 140-2 compliant ciphers for HTTPS connections.DISA STIG VMware vSphere 6.7 Virgo Client v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-01-000009 - Oracle WebLogic must utilize cryptography to protect the confidentiality of remote access management sessions - Unsecure Listen PortOracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

ACCESS CONTROL

WBLC-01-000009 - Oracle WebLogic must utilize cryptography to protect the confidentiality of remote access management sessions - Unsecure Listen PortOracle WebLogic Server 12c Windows v2r1Windows

ACCESS CONTROL

WBLC-01-000009 - Oracle WebLogic must utilize cryptography to protect the confidentiality of remote access management sessions - Unsecure Listen PortOracle WebLogic Server 12c Linux v2r1Unix

ACCESS CONTROL

WN22-CC-000370 - Windows Server 2022 Remote Desktop Services must require secure Remote Procedure Call (RPC) communications.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WN22-CC-000380 - Windows Server 2022 Remote Desktop Services must be configured with the client connection encryption set to High Level.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL