4.028 - The amount of idle time required before suspending a session must be properly set. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
APPNET0066 - .NET default proxy settings must be reviewed and approved. | DISA STIG for Microsoft Dot Net Framework 4.0 v2r4 | Windows | CONFIGURATION MANAGEMENT |
ESXI-06-100039 - The VMM must require individuals to be authenticated with an individual authenticator prior to using a group authenticator by restricting use of Active Directory ESX Admin group membership. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-100040 - The VMM must accept Personal Identity Verification (PIV) credentials. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-200040 - The VMM must electronically verify Personal Identity Verification (PIV) credentials. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-300039 - The VMM must implement replay-resistant authentication mechanisms for network access to non-privileged accounts by restricting use of Active Directory ESX Admin group membership. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXI-06-300040 - The VMM must only allow the use of DoD PKI-established certificate authorities for verification of the establishment of protected sessions. | DISA STIG VMware vSphere 6.x ESXi v1r5 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000510 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock - saverTimeout | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN000900 - The root users home directory must not be the root directory (/) - /. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN001440 - All interactive users must be assigned a home directory in the /etc/passwd file. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN001490 - User's home directories must not have extended ACLs. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - /etc/csh.login | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - /etc/csh.login | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands - /etc/profile | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002715 - System audit tool executables must be owned by root - '/sbin/autrace' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002715 - System audit tool executables must be owned by root - /usr/sbin/praudit | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002716 - System audit tool executables must be group-owned by root, bin, or sys - /usr/sbin/praudit | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/auditctl' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002717 - System audit tool executables must have mode 0750 or less permissive - '/sbin/auditd' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002717 - System audit tool executables must have mode 0750 or less permissive - /usr/sbin/auditd | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002718 - System audit tool executables must not have extended ACLs - '/sbin/autrace' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002718 - System audit tool executables must not have extended ACLs. | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN002719 - The audit system must alert the SA in the event of an audit processing failure. | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
GEN003500 - Process core dumps must be disabled unless needed - COREADM | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003501 - The system must be configured to store any process core dumps in a specific, centralized directory. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003502 - The centralized process core dump data directory must be owned by root. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003520 - The kernel core dump data directory must be owned by root. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003521 - The kernel core dump data directory must be group-owned by root. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003523 - The kernel core dump data directory must not have an extended ACL. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003611 - The system must log martian packets - 'net.ipv4.conf.default.log_martians' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | AUDIT AND ACCOUNTABILITY |
GEN003620 - A separate file system must be used for user home directories (such as /home or equivalent). | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003623 - The system must use a separate file system for the system audit data path - df -h AUDIT_DIR | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN003800 - Inetd or xinetd logging/tracing must be enabled - '/etc/xinetd.conf log_on_failure' | DISA STIG for Oracle Linux 5 v2r1 | Unix | AUDIT AND ACCOUNTABILITY |
GEN004680 - The SMTP service must not have the Verify (VRFY) feature active. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
GEN005525 - The SSH client must not permit GSSAPI authentication unless needed. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN005760 - The NFS export configuration file must have mode 0644 or less permissive. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN006570 - The file integrity tool must be configured to verify ACLs - used | DISA STIG Solaris 10 X86 v2r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN006571 - The file integrity tool must be configured to verify extended attributes - config | DISA STIG Solaris 10 X86 v2r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN006571 - The file integrity tool must be configured to verify extended attributes - used | DISA STIG Solaris 10 X86 v2r4 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN008440 - Automated file system mounting tools must not be enabled unless needed - 'chkconfig' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
GEN008440 - Automated file system mounting tools must not be enabled unless needed - 'process' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | CONFIGURATION MANAGEMENT |
GEN008460 - The system must have USB disabled unless needed - /boot/grub/grub.conf' | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT |
UBTU-20-010008 - The Ubuntu operating system must enforce a 60-day maximum password lifetime restriction. Passwords for new users must have a 60-day maximum password lifetime restriction. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
UBTU-20-010050 - The Ubuntu operating system must enforce password complexity by requiring that at least one upper-case character be used. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
UBTU-20-010051 - The Ubuntu operating system must enforce password complexity by requiring that at least one lower-case character be used. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
UBTU-20-010052 - The Ubuntu operating system must enforce password complexity by requiring that at least one numeric character be used. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
UBTU-20-010070 - The Ubuntu operating system must prohibit password reuse for a minimum of five generations. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
UBTU-22-252015 - Ubuntu 22.04 LTS must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | AUDIT AND ACCOUNTABILITY |
WN11-00-000260 - The Windows 11 time service must synchronize with an appropriate DOD time source. | DISA Windows 11 STIG v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
WN22-00-000440 - The Windows Server 2022 time service must synchronize with an appropriate DOD time source. | DISA Windows Server 2022 STIG v2r2 | Windows | AUDIT AND ACCOUNTABILITY |