Item Search

NameAudit NamePluginCategory
AIOS-12-011500 - Apple iOS must implement the management setting: use SSL for Exchange ActiveSync.AirWatch - DISA Apple iOS 12 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-12-011500 - Apple iOS must implement the management setting: use SSL for Exchange ActiveSync.MobileIron - DISA Apple iOS 12 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-13-011500 - Apple iOS/iPadOS must implement the management setting: use SSL for Exchange ActiveSync.AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

IDENTIFICATION AND AUTHENTICATION

AIOS-17-011400 - Apple iOS/iPadOS 17 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 17 Mail app.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

AIOS-17-711400 - Apple iOS/iPadOS 17 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 17 Mail app.MobileIron - DISA Apple iOS/iPadOS BYOAD 17 v1r1MDM

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

AIX7-00-001008 - All accounts on AIX system must have unique account names.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001010 - The AIX SYSTEM attribute must not be set to NONE for any account.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

APPL-15-002066 - The macOS system must disable unattended or automatic login to the system.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

ESXI-65-000037 - The ESXi host must use Active Directory for local user authentication.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-65-000038 - The ESXi host must use the vSphere Authentication Proxy to protect passwords when adding ESXi hosts to Active Directory.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-65-000039 - Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

IDENTIFICATION AND AUTHENTICATION

F5BI-AP-000077 - The BIG-IP APM module must restrict user authentication traffic to specific authentication server(s) when providing user authentication to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r3F5

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000073 - The BIG-IP Core implementation must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000075 - The BIG-IP Core implementation must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

IDENTIFICATION AND AUTHENTICATION

F5BI-LT-000077 - The BIG-IP Core implementation providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s) when providing access control to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

IDENTIFICATION AND AUTHENTICATION

GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.DISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=rootDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=roleDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000980 - The system must prevent the root account from directly logging in except from the system console.DISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000980 - The system must prevent the root account from directly logging in except from the system console.DISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000980 - The system must prevent the root account from directly logging in except from the system console.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN001020 - The root account must not be used for direct log in.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN001020 - The root account must not be used for direct logins - login reportDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN001020 - The root account must not be used for direct logins - login reportDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN001120 - The system must not permit root logins using remote access programs such as ssh.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

IDENTIFICATION AND AUTHENTICATION

GEN001120 - The system must not permit root logins using remote access programs such as ssh.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN001120 - The system must not permit root logins using remote access programs such as SSH.DISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN001120 - The system must not permit root logins using remote access programs such as SSH.DISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN005500 - The SSH daemon must be configured to only use the SSHv2 protocol.DISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN005500 - The SSH daemon must be configured to only use the SSHv2 protocol.DISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN005527 - The SSH daemon must not allow host-based authentication.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN009120 - The system, if capable, must be configured to require the use of a CAC, PIV compliant hardware token, or Alternate Logon Token (ALT) for authentication.DISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN009120 - The system, if capable, must be configured to require the use of a CAC, PIV compliant hardware token, or Alternate Logon Token (ALT) for authentication.DISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

JUSX-VN-000018 - The Juniper SRX Services Gateway VPN must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA Juniper SRX Services Gateway VPN v3r1Juniper

IDENTIFICATION AND AUTHENTICATION

MD3X-00-000310 - MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG MongoDB Enterprise Advanced 3.x v2r3 DBMongoDB

IDENTIFICATION AND AUTHENTICATION

MD3X-00-000310 - MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000309 - The NFS server must not have the insecure file locking option enabled.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000515 - The NFS server must not have the all_squash option enabled.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL07-00-020300 - The Oracle Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file - GIDs referenced in the /etc/passwd file are defined in the /etc/group file.DISA Oracle Linux 7 STIG v2r14Unix

IDENTIFICATION AND AUTHENTICATION

PGS9-00-011500 - PostgreSQL must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

IDENTIFICATION AND AUTHENTICATION

PPS9-00-004200 - The EDB Postgres Advanced Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).EDB PostgreSQL Advanced Server OS Linux Audit v2r3Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-06-000294 - All GIDs referenced in /etc/passwd must be defined in /etc/groupDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SLES-15-010230 - The SUSE operating system must not have duplicate User IDs (UIDs) for interactive users.DISA SLES 15 STIG v2r2Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000020 - Splunk Enterprise must use organization level authentication to uniquely identify and authenticate users.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SQL4-00-018400 - SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) - or processes acting on behalf of organizational users.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

UBTU-22-411015 - Ubuntu 22.04 LTS must uniquely identify interactive users.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000150 - Oracle WebLogic must uniquely identify and authenticate users (or processes acting on behalf of users).Oracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

WN16-00-000080 - Shared user accounts must not be permitted on the system.DISA Windows Server 2016 STIG v2r9Windows

IDENTIFICATION AND AUTHENTICATION

WN19-00-000070 - Windows Server 2019 shared user accounts must not be permitted.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION