Item Search

NameAudit NamePluginCategory
AD.4033_2008 - The computer clock synchronization tolerance must be limited to 5 minutes or less.DISA Windows Server 2008 DC STIG v6r47Windows

AUDIT AND ACCOUNTABILITY

AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - lssrc sshdDISA STIG AIX 7.x v2r5Unix
AIX7-00-001012 - AIX must use the SSH server to implement replay-resistant authentication mechanisms for network access to privileged and non-privileged accounts - lssrc sshdDISA STIG AIX 7.x v2r6Unix
CISC-ND-000530 - The Cisco router must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh algorithmDISA STIG Cisco IOS XE Router NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000530 - The Cisco router must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh versionDISA STIG Cisco IOS-XR Router NDM v2r4Cisco
CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ip ssh server algorithmDISA STIG Cisco IOS XE Switch NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ip ssh version 2DISA STIG Cisco IOS Switch NDM v2r2Cisco
CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.DISA STIG Cisco NX-OS Switch NDM v2r6Cisco
CISC-ND-001200 - The Cisco router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessionsDISA STIG Cisco IOS XE Router NDM v2r7Cisco
CISC-ND-001200 - The Cisco router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions - ip ssh server algorithm macDISA STIG Cisco IOS Router NDM v2r4Cisco
CISC-ND-001200 - The Cisco router must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.DISA STIG Cisco IOS Router NDM v2r6Cisco
CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions - HMAC to protect the integrity of remote maintenance sessionsDISA STIG Cisco IOS Switch NDM v2r7Cisco
CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions - ip ssh server algorithm macDISA STIG Cisco IOS XE Switch NDM v2r3Cisco
CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions - ip ssh version 2DISA STIG Cisco IOS XE Switch NDM v2r4Cisco
CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.DISA STIG Cisco IOS Switch NDM v2r8Cisco
ESXI-06-200037 - The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by using Active Directory for local user authentication.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-200038 - The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by using the vSphere Authentication Proxy.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-06-200039 - The VMM must implement replay-resistant authentication mechanisms for network access to privileged accounts by restricting use of Active Directory ESX Admin group membership.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-67-000037 - The ESXi host must use Active Directory for local user authentication.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
ESXI-67-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.DISA STIG VMware vSphere 6.7 ESXi v1r2VMware
UBTU-18-010412 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts.DISA STIG Ubuntu 18.04 LTS v2r10Unix
UBTU-18-010412 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts.DISA STIG Ubuntu 18.04 LTS v2r13Unix
UBTU-18-010412 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts.DISA STIG Ubuntu 18.04 LTS v2r2Unix
UBTU-18-010412 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts.DISA STIG Ubuntu 18.04 LTS v2r7Unix
UBTU-18-010412 - The Ubuntu operating system must enforce SSHv2 for network access to all accounts.DISA STIG Ubuntu 18.04 LTS v2r8Unix
WN16-DC-000020 - Kerberos user logon restrictions must be enforced.DISA Windows Server 2016 STIG v2r6Windows
WN16-DC-000020 - Kerberos user logon restrictions must be enforced.DISA Windows Server 2016 STIG v2r4Windows
WN16-DC-000030 - The Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2016 STIG v2r5Windows
WN16-DC-000030 - The Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2016 STIG v2r4Windows
WN16-DC-000040 - The Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2016 STIG v2r6Windows
WN16-DC-000040 - The Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2016 STIG v2r4Windows
WN16-DC-000040 - The Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2016 STIG v2r7Windows
WN16-DC-000050 - The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2016 STIG v2r6Windows
WN16-DC-000050 - The Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2016 STIG v2r5Windows
WN16-DC-000060 - The computer clock synchronization tolerance must be limited to 5 minutes or less.DISA Windows Server 2016 STIG v2r6Windows
WN19-DC-000020 - Windows Server 2019 Kerberos user logon restrictions must be enforced.DISA Windows Server 2019 STIG v2r4Windows
WN19-DC-000020 - Windows Server 2019 Kerberos user logon restrictions must be enforced.DISA Windows Server 2019 STIG v2r8Windows
WN19-DC-000030 - Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2019 STIG v2r8Windows
WN19-DC-000030 - Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2019 STIG v2r4Windows
WN19-DC-000030 - Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2019 STIG v2r7Windows
WN19-DC-000030 - Windows Server 2019 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2019 STIG v2r5Windows
WN19-DC-000040 - Windows Server 2019 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2019 STIG v2r7Windows
WN19-DC-000040 - Windows Server 2019 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2019 STIG v2r4Windows
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2019 STIG v2r7Windows
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2019 STIG v2r8Windows
WN19-DC-000050 - Windows Server 2019 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2019 STIG v2r5Windows
WN19-DC-000060 - Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2019 STIG v2r8Windows
WN19-DC-000060 - Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2019 STIG v2r4Windows
WN19-DC-000060 - Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2019 STIG v2r5Windows
WN19-DC-000060 - Windows Server 2019 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2019 STIG v2r7Windows