4.330 - The system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
4.350 - The system must be configured so that the SSH daemon does not allow authentication using rhosts authentication. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
4.380 - The system must be configured so that the SSH daemon does not allow authentication using known hosts authentication. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH IgnoreRhosts is enabled | CIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.7 Ensure SSH IgnoreRhosts is enabled | CIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 20.04 LTS Workstation L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure SSH HostbasedAuthentication is disabled | CIS Ubuntu Linux 20.04 LTS Server L1 v1.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.8 Ensure SSH IgnoreRhosts is enabled | CIS Oracle Linux 7 Workstation L1 v3.0.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
5.2.9 Ensure SSH HostbasedAuthentication is disabled | CIS Debian 8 Server L1 v2.0.1 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.2.6 Set SSH IgnoreRhosts to Yes | CIS Red Hat Enterprise Linux 5 L1 v2.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
6.2.7 Set SSH HostbasedAuthentication to No | CIS Red Hat Enterprise Linux 5 L1 v2.2 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
AIOS-11-010800 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted. | MobileIron - DISA Apple iOS 11 v1r4 | MDM | ACCESS CONTROL |
AIOS-11-010800 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted. | AirWatch - DISA Apple iOS 11 v1r4 | MDM | ACCESS CONTROL |
AIOS-12-010500 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted. | MobileIron - DISA Apple iOS 12 v1r2 | MDM | ACCESS CONTROL |
AIOS-12-010500 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted. | AirWatch - DISA Apple iOS 12 v1r2 | MDM | ACCESS CONTROL |
AIOS-13-010500 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted. | MobileIron - DISA Apple iOS/iPadOS 13 v1r1 | MDM | ACCESS CONTROL |
AIOS-13-010500 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted. | AirWatch - DISA Apple iOS/iPadOS 13 v1r1 | MDM | ACCESS CONTROL |
AOSX-09-000925 - The operating system must not allow an unattended or automatic logon to the system. | DISA STIG Apple Mac OSX 10.9 v1r2 | Unix | ACCESS CONTROL |
AOSX-10-000925 - The operating system must not allow an unattended or automatic logon to the system. | DISA STIG Apple Mac OSX 10.10 v1r5 | Unix | ACCESS CONTROL |
AOSX-11-000925 - The operating system must not allow an unattended or automatic logon to the system. | DISA STIG Apple Mac OSX 10.11 v1r6 | Unix | ACCESS CONTROL |
AOSX-12-000925 - The OS X system must not allow an unattended or automatic logon to the system. | DISA STIG Apple Mac OSX 10.12 v1r6 | Unix | ACCESS CONTROL |
ESXI-65-000012 - The ESXi host SSH daemon must ignore .rhosts files. | DISA STIG VMware vSphere ESXi OS 6.5 v1r4 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
ESXI-65-000013 - The ESXi host SSH daemon must not allow host-based authentication. | DISA STIG VMware vSphere ESXi OS 6.5 v1r4 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
ESXI5-VM-000014 - Unexposed feature isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs attack vectors | DISA STIG VMWare ESXi 5 Virtual Machine STIG v1r6 | VMware | ACCESS CONTROL |
ESXI5-VM-000014 - Unexposed feature isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs attack vectors | DISA STIG VMWare ESXi 5 Virtual Machine STIG v1r7 | VMware | ACCESS CONTROL |
GEN002100 - The .rhosts file must not be supported in PAM | DISA STIG HP-UX 11.31 v1r19 | Unix | ACCESS CONTROL |
GEN002100 - The .rhosts file must not be supported in PAM. | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL |
GEN002100 - The .rhosts file must not be supported in PAM. | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL |
GEN002100 - The .rhosts file must not be supported in PAM. | DISA STIG Solaris 10 SPARC v2r1 | Unix | ACCESS CONTROL |
GEN002100 - The .rhosts file must not be supported in PAM. | DISA STIG Solaris 10 SPARC v2r2 | Unix | ACCESS CONTROL |
GEN002100 - The .rhosts file must not be supported in PAM. | DISA STIG Solaris 10 X86 v2r1 | Unix | ACCESS CONTROL |
GEN004700 - The Sendmail service must not have the wizard backdoor active | DISA STIG HP-UX 11.31 v1r19 | Unix | ACCESS CONTROL |
GEN004700 - The sendmail service must not have the wizard backdoor active. | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL |
GEN004700 - The Sendmail service must not have the wizard backdoor active. | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL |
GEN004700 - The Sendmail service must not have the wizard backdoor active. | DISA STIG Solaris 10 SPARC v2r1 | Unix | ACCESS CONTROL |
GEN004700 - The Sendmail service must not have the wizard backdoor active. | DISA STIG Solaris 10 X86 v2r2 | Unix | ACCESS CONTROL |
GEN004700 - The Sendmail service must not have the wizard backdoor active. | DISA STIG Solaris 10 SPARC v2r2 | Unix | ACCESS CONTROL |
GEN005527 - The SSH daemon must not allow host-based authentication. | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
GEN005527 - The SSH daemon must not allow host-based authentication. | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
GEN005538 - The SSH daemon must not allow rhosts RSA authentication | DISA STIG HP-UX 11.31 v1r19 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005538 - The SSH daemon must not allow rhosts RSA authentication. | DISA STIG AIX 6.1 v1r13 | Unix | ACCESS CONTROL |
GEN005538 - The SSH daemon must not allow rhosts RSA authentication. | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005538 - The SSH daemon must not allow rhosts RSA authentication. | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN005820 - The NFS anonymous UID and GID must be configured to values that have no permissions - 'anongid' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005820 - The NFS anonymous UID and GID must be configured to values that have no permissions - 'anonuid' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005820 - The NFS anonymous UID and GID must be configured to values without permissions. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005820 - The NFS anonymous UID and GID must be configured to values without permissions. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
OSX00425 - Disable automatic login | DISA STIG Apple Mac OSX 10.5 v1r2 | Unix | ACCESS CONTROL |
OSX00425 M6 - Automatic login must be disabled - 'autoLoginUser is not defined' | DISA STIG Apple Mac OSX 10.6 v1r3 | Unix | ACCESS CONTROL |
VMCH-65-000009 - The unexposed feature keyword isolation.tools.ghi.autologon.disable must be set on the virtual machine. | DISA STIG VMware vSphere Virtual Machine 6.5 v1r2 | VMware | ACCESS CONTROL |