APPNET0060 - Remoting Services HTTP channels must utilize authentication and encryption - applications | DISA STIG for Microsoft Dot Net Framework 4.0 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
APPNET0062 - The .NET CLR must be configured to use FIPS approved encryption modules - machine | DISA STIG for Microsoft Dot Net Framework 4.0 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
APPNET0071 - Remoting Services TCP channels must utilize authentication and encryption - applications | DISA STIG for Microsoft Dot Net Framework 4.0 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
APPNET0071 - Remoting Services TCP channels must utilize authentication and encryption - machine | DISA STIG for Microsoft Dot Net Framework 4.0 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
APPNET0075 - Disable TLS RC4 cipher in .Net - Wow6432Node | DISA STIG for Microsoft Dot Net Framework 4.0 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBF030 - Firefox must be configured to allow only TLS - security.tls.version.max | DISA STIG Mozilla Firefox Linux v5r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBF030 - Firefox must be configured to allow only TLS - security.tls.version.min | DISA STIG Mozilla Firefox Linux v5r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBF030 - Firefox must be configured to allow only TLS - security.tls.version.min | DISA STIG Mozilla Firefox Windows v5r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBF235 - Deprecated ciphers must be disabled. | DISA STIG Mozilla Firefox Windows v5r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBF235 - Deprecated ciphers must be disabled. | DISA STIG Mozilla Firefox Linux v5r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO187 - Rights managed Office Open XML files must be protected. | DISA STIG Microsoft Office System 2016 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO187 - Rights managed Office Open XML files must be protected. | DISA STIG Microsoft Office System 2013 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO188 - Document metadata for password protected files must be protected. | DISA STIG Microsoft Office System 2013 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO188 - Document metadata for password protected files must be protected. | DISA STIG Microsoft Office System 2016 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO189 - The encryption type for password protected Open XML files must be set. | DISA STIG Microsoft Office System 2013 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO189 - The encryption type for password protected Open XML files must be set. | DISA STIG Microsoft Office System 2016 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO195 - Passwords for secured documents must be enforced. | DISA STIG Microsoft Office System 2013 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO262 - Run in FIPS compliant mode must be enforced. | DISA STIG Microsoft Outlook 2016 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO316 - Outlook minimum encryption key length settings must be set. | DISA STIG Microsoft Outlook 2016 v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO321 - Encrypt document properties must be configured for OLE documents. | DISA STIG Microsoft Office System 2016 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO412 - The ability to run unsecure Office apps must be disabled. | DISA STIG Microsoft Office System 2013 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTOO412 - The ability to run unsecure Office web add-ins and Catalogs must be disabled. | DISA STIG Microsoft Office System 2016 v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOW | DISA STIG Solaris 10 SPARC v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOW | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOW | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOW | DISA STIG Solaris 10 X86 v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULT | DISA STIG Solaris 10 X86 v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULT | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_DEFAULT | DISA STIG Solaris 10 SPARC v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - CRYPT_ALGORITHMS_ALLOW | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - CRYPT_ALGORITHMS_ALLOW | DISA STIG Solaris 10 SPARC v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - CRYPT_DEFAULT | DISA STIG Solaris 10 SPARC v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers. | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers. | DISA STIG Solaris 10 X86 v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005506 - The SSH daemon must be configured to not use Cipher-Block Chaining (CBC) ciphers. | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005506 - The SSH daemon must be configured to not use Cipher-Block Chaining (CBC) ciphers. | DISA STIG Solaris 10 SPARC v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005507 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA STIG Solaris 10 SPARC v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005507 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers. | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005511 - The SSH client must be configured to not use CBC-based ciphers. | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005511 - The SSH client must be configured to not use CBC-based ciphers. | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005512 - The SSH client must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms. | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN007980 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms - configured | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN007980 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms - configured | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN007980 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms - servers | DISA STIG Solaris 10 X86 v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN007980 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms - servers | DISA STIG Solaris 10 SPARC v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PPS9-00-009100 - The EDB Postgres Advanced Server must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions - CAs | EDB PostgreSQL Advanced Server OS Linux Audit v1r7 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
WG340 IIS7 - A private web server must utilize an approved TLS version. | DISA IIS 7.0 Web Site v1r19 | Windows | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
WPAW-00-001700 - The Windows PAW must use a trusted channel for all connections between a PAW and IT resources managed from the PAW. | DISA MS Windows Privileged Access Workstation v1r2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WPAW-00-001700 - The Windows PAW must use a trusted channel for all connections between a PAW and IT resources managed from the PAW. | DISA MS Windows Privileged Access Workstation v1r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |