AIOS-16-014800 - Apple iOS/iPadOS 16 must be configured to disable Auto Unlock of the iPhone by an Apple Watch. | MobileIron - DISA Apple iOS/iPadOS 16 v2r1 | MDM | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
AIOS-17-014800 - Apple iOS/iPadOS 17 must be configured to disable 'Auto Unlock' of the iPhone by an Apple Watch - Auto Unlock of the iPhone by an Apple Watch. | MobileIron - DISA Apple iOS/iPadOS 17 v2r1 | MDM | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION |
AS24-W2-000690 - Non-privileged accounts on the hosting system must only access Apache web server security-relevant information and functions through a distinct administrative account. | DISA STIG Apache Server 2.4 Windows Site v2r1 | Windows | ACCESS CONTROL |
IIST-SV-000144 - IIS 10.0 web server system files must conform to minimum file permission requirements. | DISA IIS 10.0 Server v2r10 | Windows | ACCESS CONTROL |
IIST-SV-000144 - IIS 10.0 web server system files must conform to minimum file permission requirements. | DISA IIS 10.0 Server v3r1 | Windows | ACCESS CONTROL |
O365-CO-000010 - Users must be prevented from creating new trusted locations in the Trust Center. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | ACCESS CONTROL |
O365-OU-000008 - Outlook must be configured to prevent users overriding attachment security settings. | DISA STIG Microsoft Office 365 ProPlus v3r1 | Windows | ACCESS CONTROL |
OL07-00-020023 - The Oracle Linux operating system must elevate the SELinux context when an administrator calls the sudo command. | DISA Oracle Linux 7 STIG v2r14 | Unix | ACCESS CONTROL |
RHEL-07-020021 - The Red Hat Enterprise Linux operating system must confine SELinux users to roles that conform to least privilege. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL |
RHEL-07-020023 - The Red Hat Enterprise Linux operating system must elevate the SELinux context when an administrator calls the sudo command. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL |
RHEL-09-213030 - RHEL 9 must enable kernel parameters to enforce discretionary access control on hardlinks. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
SQL6-D0-010400 - SQL Server must prevent non-privileged users from executing privileged functions, to include disabling, circumventing, or altering implemented security safeguards/countermeasures. | DISA STIG SQL Server 2016 Instance DB Audit v3r1 | MS_SQLDB | ACCESS CONTROL |
TCAT-AS-001050 - Tomcat user account must be set to nologin. | DISA STIG Apache Tomcat Application Server 9 v3r1 Middleware | Unix | ACCESS CONTROL |
WN10-SO-000167 - Remote calls to the Security Account Manager (SAM) must be restricted to Administrators. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN10-UR-000030 - The Back up files and directories user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN10-UR-000035 - The Change the system time user right must only be assigned to Administrators and Local Service and NT SERVICE\autotimesvc. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN10-UR-000040 - The Create a pagefile user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN10-UR-000055 - The Create permanent shared objects user right must not be assigned to any groups or accounts. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN10-UR-000110 - The Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN10-UR-000160 - The Restore files and directories user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN12-UR-000003 - The Act as part of the operating system user right must not be assigned to any groups or accounts. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000012 - The Create a token object user right must not be assigned to any groups or accounts. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000013 - The Create global objects user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000014 - The Create permanent shared objects user right must not be assigned to any groups or accounts. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000023 - The Force shutdown from a remote system user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000027 - The Increase scheduling priority user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000029 - The Lock pages in memory user right must not be assigned to any groups or accounts. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000034 - The Modify firmware environment values user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UR-000040 - The Restore files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN16-00-000190 - Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained. | DISA Windows Server 2016 STIG v2r9 | Windows | ACCESS CONTROL |
WN16-MS-000310 - Remote calls to the Security Account Manager (SAM) must be restricted to Administrators. | DISA Windows Server 2016 STIG v2r9 | Windows | ACCESS CONTROL |
WN16-UR-000240 - The Load and unload device drivers user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r9 | Windows | ACCESS CONTROL |
WN16-UR-000300 - The Restore files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2016 STIG v2r9 | Windows | ACCESS CONTROL |
WN19-00-000170 - Windows Server 2019 default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-DC-000010 - Windows Server 2019 must only allow administrators responsible for the domain controller to have Administrator rights on the system. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-DC-000070 - Windows Server 2019 permissions on the Active Directory data files must only allow System and Administrators access. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-DC-000080 - Windows Server 2019 Active Directory SYSVOL directory must have the proper access control permissions. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-DC-000110 - Windows Server 2019 organization created Active Directory Organizational Unit (OU) objects must have proper access control permissions. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-DC-000350 - Windows Server 2019 Add workstations to domain user right must only be assigned to the Administrators group on domain controllers. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-MS-000010 - Windows Server 2019 must only allow Administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-MS-000060 - Windows Server 2019 must restrict remote calls to the Security Account Manager (SAM) to Administrators on domain-joined member servers and standalone or nondomain-joined systems. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000060 - Windows Server 2019 Create a token object user right must not be assigned to any groups or accounts. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000080 - Windows Server 2019 Create permanent shared objects user right must not be assigned to any groups or accounts. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000090 - Windows Server 2019 Create symbolic links user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000110 - Windows Server 2019 Force shutdown from a remote system user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000130 - Windows Server 2019 Impersonate a client after authentication user right must only be assigned to Administrators, Service, Local Service, and Network Service. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000160 - Windows Server 2019 Lock pages in memory user right must not be assigned to any groups or accounts. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000180 - Windows Server 2019 Modify firmware environment values user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000200 - Windows Server 2019 Profile single process user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN19-UR-000210 - Windows Server 2019 Restore files and directories user right must only be assigned to the Administrators group. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |