Item Search

NameAudit NamePluginCategory
GEN000450 - The system must limit users to 10 simultaneous system logins in accordance with operational requirements.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000452 - The system must display the date and time of the last successful account login upon login.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN000452 - The system must display the date and time of the last successful account login upon login.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000900 - The root user's home directory must not be the root directory (/).DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/info/*'DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001375 - For systems using DNS resolution, at least two name servers must be configured - second name serverDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN001460 - All interactive user home directories defined in the /etc/passwd file must exist.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN001540 - All files and directories contained in interactive user home directories must be owned by the home directory's owner.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001560 - All files and directories contained in user home directories must have mode 0750 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001780 - Global initialization files must contain the 'mesg -n' or 'mesg n' commands - '/etc/csh.logout'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002260 - The system must be checked for extraneous device files at least weekly.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002715 - System audit tool executables must be owned by root - '/sbin/audispd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/sbin/auditd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002715 - System audit tool executables must be owned by root - '/usr/sbin/audit'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002716 - System audit tool executables must be group-owned by bin, sys, or system - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/auditd'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditmerge'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditselect'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/usr/sbin/auditstream'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/auditctl'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/audit'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002718 - System audit tool executables must not have extended ACLs - '/usr/sbin/auditbin'DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN002719 - The audit system must alert the SA in the event of an audit processing failure - '/etc/audit/auditd.conf disk_full_action'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.weekly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/var/spool/cron/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003500 - Process core dumps must be disabled unless needed.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN003520 - The kernel core dump data directory must be owned by root.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003521 - The kernel core dump data directory must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003522 - The kernel core dump data directory must have mode 0700 or less permissive.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN003523 - The kernel core dump data directory must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-reply -j DROP'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003602 - The system must not process Internet Control Message Protocol (ICMP) timestamp requests - 'timestamp-request -j DROP'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003621 - The system must use a separate file system for /var.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003623 - The system must use a separate file system for the system audit data path.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003624 - The system must use a separate file system for /tmp (or equivalent).DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_on_success'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003800 - Xinetd logging/tracing must be enabled - '/etc/xinetd.d/* log_type'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN003860 - The system must not have the finger service active.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN004560 - The SMTP service's SMTP greeting must not provide version information.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN004660 - The SMTP service must not have the EXPN feature active.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN004680 - The SMTP service must not have the VRFY feature active.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN004700 - The Sendmail service must not have the wizard backdoor active.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005524 - The SSH daemon must not permit GSSAPI authentication unless needed.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005525 - The SSH client must not permit GSSAPI authentication unless needed.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005770 - The NFS exports configuration file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006571 - The file integrity tool must be configured to verify extended attributes.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN008500 - The system must have IEEE 1394 (Firewire) disabled unless needed.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

OL08-00-020170 - OL 8 must require the change of at least eight characters when passwords are changed.DISA Oracle Linux 8 STIG v2r1Unix

IDENTIFICATION AND AUTHENTICATION