Item Search

NameAudit NamePluginCategory
AOSX-14-002054 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - HiddenPreferencePanesDISA STIG Apple Mac OSX 10.14 v2r5Unix
AOSX-14-002054 - The macOS system must be configured with Bluetooth turned off unless approved by the organization. - DisableBluetoothDISA STIG Apple Mac OSX 10.14 v2r4Unix
AOSX-14-002054 - The macOS system must be configured with Bluetooth turned off unless approved by the organization. - DisabledPreferencePanesDISA STIG Apple Mac OSX 10.14 v2r4Unix
APPL-11-002062 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - DisableBluetoothDISA STIG Apple macOS 11 v1r3Unix
APPL-11-002062 - The macOS system must be configured with Bluetooth turned off unless approved by the organization - HiddenPreferencePanesDISA STIG Apple macOS 11 v1r3Unix
CASA-VN-000180 - The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation - ikev2DISA STIG Cisco ASA VPN v1r2Cisco
CASA-VN-000180 - The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation - ikev2DISA STIG Cisco ASA VPN v1r1Cisco
CASA-VN-000180 - The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation - peerDISA STIG Cisco ASA VPN v1r1Cisco
CASA-VN-000180 - The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation - peerDISA STIG Cisco ASA VPN v1r2Cisco
CASA-VN-000180 - The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation - pfsDISA STIG Cisco ASA VPN v1r1Cisco
CASA-VN-000180 - The Cisco ASA must be configured to specify Perfect Forward Secrecy (PFS) for the IPsec Security Association (SA) during IKE Phase 2 negotiation - pfsDISA STIG Cisco ASA VPN v1r2Cisco
CNTR-K8-002620 - Kubernetes API Server must disable basic authentication to protect information in transit.DISA STIG Kubernetes v1r2Unix
CNTR-K8-002620 - Kubernetes API Server must disable basic authentication to protect information in transit.DISA STIG Kubernetes v1r4Unix
CNTR-K8-002630 - Kubernetes API Server must disable token authentication to protect information in transit.DISA STIG Kubernetes v1r4Unix
CNTR-K8-002640 - Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit - kubelet-client-certificateDISA STIG Kubernetes v1r2Unix
CNTR-K8-002640 - Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit - kubelet-client-certificateDISA STIG Kubernetes v1r5Unix
CNTR-K8-002640 - Kubernetes endpoints must use approved organizational certificate and key pair to protect information in transit - kubelet-client-keyDISA STIG Kubernetes v1r4Unix
ESXI-06-000049 - The system must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.DISA STIG VMware vSphere 6.x ESXi v1r4VMware
ESXI-65-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.DISA STIG VMware vSphere ESXi 6.5 v1r4VMware
ESXI-65-000052 - The ESXi host must protect the confidentiality and integrity of transmitted information by utilizing different TCP/IP stacks where possible.DISA STIG VMware vSphere ESXi 6.5 v1r4VMware
ESXI-67-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.DISA STIG VMware vSphere 6.7 ESXi v1r1VMware
ESXI-67-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
ESXI-67-000050 - The ESXi host must protect the confidentiality and integrity of transmitted information by isolating IP-based storage traffic.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
ESXI-67-000052 - The ESXi host must protect the confidentiality and integrity of transmitted information by using different TCP/IP stacks where possible.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
IISW-SV-000154 - A web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.DISA IIS 8.5 Server v1r9Windows
RHEL-08-040159 - All RHEL 8 networked systems must have SSH installed.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-040159 - All RHEL 8 networked systems must have SSH installed.DISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-040159 - All RHEL 8 networked systems must have SSH installed.DISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-040159 - All RHEL 8 networked systems must have SSH installed.DISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-040159 - All RHEL 8 networked systems must have SSH installed.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-040160 - All RHEL 8 networked systems must have and implement SSH to protect the confidentiality and integrity of transmitted and received information, as well as information during preparation for transmission.DISA Red Hat Enterprise Linux 8 STIG v1r8Unix
SPLK-CL-000460 - Splunk Enterprise must be configured to protect the confidentiality and integrity of transmitted information.DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG REST APISplunk
SPLK-CL-000460 - Splunk Enterprise must be configured to protect the confidentiality and integrity of transmitted information.DISA STIG Splunk Enterprise 8.x for Linux v1r4 STIG REST APISplunk
UBTU-20-010455 - The Ubuntu operating system must disable all wireless network adapters.DISA STIG Ubuntu 20.04 LTS v1r5Unix
UBTU-20-010455 - The Ubuntu operating system must disable all wireless network adapters.DISA STIG Ubuntu 20.04 LTS v1r1Unix
VCLD-67-000034 - VAMI must implement TLS1.2 exclusively - sslv2DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r2Unix
VCLD-67-000034 - VAMI must implement TLS1.2 exclusively - sslv2DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r1Unix
VCPF-67-000030 - Performance Charts must set the secure flag for cookies.DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r1Unix
VCPF-67-000030 - Performance Charts must set the secure flag for cookies.DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r2Unix
VCST-67-000030 - The Security Token Service must set the secure flag for cookies.DISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000030 - The Security Token Service must set the secure flag for cookies.DISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
WN08-MO-000003 - The VPN client on mobile devices must use either IPSec or SSL/TLS when connecting to DoD networks.DISA Windows 8/8.1 STIG v1r23Windows
WN11-SO-000060 - The system must be configured to require a strong session key.DISA Windows 11 STIG v1r5Windows
WN11-SO-000100 - The Windows SMB client must be configured to always perform SMB packet signing.DISA Windows 11 STIG v1r4Windows