3.032 - Ctrl+Alt+Del security attention sequence is Disabled. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.076 - The system is not configured to meet the minimum requirement for session security for NTLM SSP based Clients. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
3.125 - Audit policy using subcategories is enabled. | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
3.129 - User Account Control - Built In Admin Approval Mode | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.134 - User Account Control - Elevate UIAccess applications that are in secure locations | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.002 - Number of allowed bad-logon attempts does not meet minimum requirements. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.004 - Lockout duration does not meet minimum requirements. | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
4.008 - Auditing must be configured as required. - 'Account Management -> User Account Management' | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
4.008 - Auditing must be configured as required. - 'Logon/Logoff -> Special Logon' successes. | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
4.008 - Auditing must be configured as required. - System -> Security System Extension' | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
4.010 - User rights assignments must meet minimum requirements. - Allow log on through Terminal Services | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Create permanent shared objects | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Force shutdown from a remote system | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Impersonate a client after authentication | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Load and unload device drivers | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Log on as a batch job | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Replace a process level token | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.010 - User rights assignments must meet minimum requirements. - Restore files and directories | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
4.020 - The built-in guest account is not disabled. | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
5.002 - Event log sizes do not meet minimum requirements. - Application | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
5.002 - Event log sizes do not meet minimum requirements. - Setup | DISA Windows Vista STIG v6r41 | Windows | AUDIT AND ACCOUNTABILITY |
5.004 - Installed FTP server is configured to allow prohibited logins. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.044 - Terminal Services is configured to use a common temporary folder for all sessions. | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.107 - A Windows system has an incorrect default DCOM authorization level. - None | DISA Windows Vista STIG v6r41 | Windows | CONFIGURATION MANAGEMENT |
5.116 - Terminal Services / Remote Desktop Service - Prevent password saving in the Remote Desktop Client | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
5.118 - Terminal Services / Remote Desktop Services - Local drives prevented from sharing with Terminal Servers. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
GEN004930 - The ftpusers file must be group-owned by bin, sys, or system. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005120 - The TFTP daemon must be configured to vendor specs including a home directory owned by the TFTP user - 'tftp user exists' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005190 - The .Xauthority files must not have extended ACLs. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005320 - The snmpd.conf file must have mode 0600 or less permissive - '/etc/snmpdv3.conf' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005360 - The snmpd.conf file must be owned by root - '/etc/snmpd.conf' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005440 - The system must not be used as a syslog server (loghost) for systems external to the enclave. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005523 - The SSH private host key files must have mode 0600 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005538 - The SSH daemon must not allow rhosts RSA authentication. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006160 - The /var/private/smbpasswd file must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006225 - Samba must be configured to use an authentication mechanism other than share. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006235 - Samba must be configured to not allow guest access to shares. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006270 - The /etc/news/hosts.nntp file must not have an extended ACL. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006280 - The /etc/news/hosts.nntp.nolimit (or equivalent) must have mode 0600 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006290 - The /etc/news/hosts.nntp.nolimit file must not have an extended ACL. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006320 - The /etc/news/passwd.nntp file (or equivalent) must have mode 0600 or less permissive. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006340 - Files in /etc/news must be owned by root or news. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN006580 - The system must use an access control program. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006600 - The system's access control program must log each system access attempt - 'mail.debug' | DISA STIG AIX 5.3 v1r2 | Unix | AUDIT AND ACCOUNTABILITY |
GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - '/etc/hosts.deny' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN006640 - The system must use and update a DoD-approved virus scan program - 'clean.dat' | DISA STIG AIX 5.3 v1r2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN007880 - The system must not send IPv6 ICMP redirects. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN007940 - The system must not accept source-routed IPv6 packets. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN008100 - If the system is using LDAP the /etc/ldap.conf file must be group-owned by security, bin, sys, or system | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN008160 - The TLS certificate authority file and/or directory (as appropriate) must be group-owned by root, bin, sys, or system | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |