Item Search

NameAudit NamePluginCategory
1.3.2 Ensure filesystem integrity is regularly checked - aideCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

GEN000140 - A file integrity baseline must be created and maintained.DISA STIG Solaris 10 X86 v2r2Unix
GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.DISA STIG Solaris 10 SPARC v2r1Unix
GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.DISA STIG Solaris 10 X86 v2r1Unix
GEN002460 - The system must be checked weekly for unauthorized setgid files, as well as, unauthorized modification to authorized setgid files.DISA STIG Solaris 10 SPARC v2r1Unix
GEN002460 - The system must be checked weekly for unauthorized setgid files, as well as, unauthorized modification to authorized setgid files.DISA STIG Solaris 10 X86 v2r2Unix
OL6-00-000302 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.DISA STIG Oracle Linux 6 v2r6Unix
OL6-00-000303 - The operating system must employ automated mechanisms, per organization defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA STIG Oracle Linux 6 v2r6Unix
OL6-00-000304 - The operating system must employ automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization defined frequency.DISA STIG Oracle Linux 6 v2r6Unix
OL6-00-000305 - The operating system must provide a near real-time alert when any of the organization defined list of compromise or potential compromise indicators occurs.DISA STIG Oracle Linux 6 v2r6Unix
OL6-00-000306 - The operating system must detect unauthorized changes to software and information.DISA STIG Oracle Linux 6 v2r6Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aideDISA Oracle Linux 7 STIG v2r13Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aideDISA Oracle Linux 7 STIG v2r9Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aideDISA Oracle Linux 7 STIG v2r11Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aideDISA Oracle Linux 7 STIG v2r12Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Oracle Linux 7 STIG v2r12Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Oracle Linux 7 STIG v2r11Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Oracle Linux 7 STIG v2r13Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Oracle Linux 7 STIG v2r9Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - aideDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - aideDISA Oracle Linux 8 STIG v1r6Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - grep aide /etc/crontab /var/spool/cron/rootDISA Oracle Linux 8 STIG v1r2Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - grep aide /etc/crontab /var/spool/cron/rootDISA Oracle Linux 8 STIG v1r4Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - ls -la /etc/cron.* | grep aideDISA Oracle Linux 8 STIG v1r4Unix
RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly - aideDISA Red Hat Enterprise Linux 7 STIG v3r9Unix
RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly - cronDISA Red Hat Enterprise Linux 7 STIG v3r12Unix
RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly - cronDISA Red Hat Enterprise Linux 7 STIG v3r9Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aideDISA Red Hat Enterprise Linux 7 STIG v3r9Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Red Hat Enterprise Linux 7 STIG v3r10Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Red Hat Enterprise Linux 7 STIG v3r12Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Red Hat Enterprise Linux 7 STIG v3r8Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cronDISA Red Hat Enterprise Linux 7 STIG v3r9Unix
RHEL-09-651015 - RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 15 STIG v1r10Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 15 STIG v1r12Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.DISA SLES 15 STIG v1r11Unix
SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA STIG Solaris 11 SPARC v2r7Unix
SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA STIG Solaris 11 SPARC v2r8Unix
VCSA-70-000150 - vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.DISA STIG VMware vSphere 7.0 vCenter v1r2VMware
WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Windows Server 2016 STIG v2r5Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Windows Server 2016 STIG v2r3Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Windows Server 2016 STIG v2r6Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Windows Server 2016 STIG v2r7Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Windows Server 2016 STIG v2r2Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.DISA Windows Server 2016 STIG v2r4Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.DISA Windows Server 2019 STIG v2r8Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.DISA Windows Server 2019 STIG v2r3Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.DISA Windows Server 2019 STIG v2r5Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.DISA Windows Server 2019 STIG v2r7Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.DISA Windows Server 2019 STIG v2r2Windows