Item Search

NameAudit NamePluginCategory
3.032 - Ctrl+Alt+Del security attention sequence is Disabled.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.076 - The system is not configured to meet the minimum requirement for session security for NTLM SSP based Clients.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

3.125 - Audit policy using subcategories is enabled.DISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

3.129 - User Account Control - Built In Admin Approval ModeDISA Windows Vista STIG v6r41Windows

IDENTIFICATION AND AUTHENTICATION

3.134 - User Account Control - Elevate UIAccess applications that are in secure locationsDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.002 - Number of allowed bad-logon attempts does not meet minimum requirements.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL

4.004 - Lockout duration does not meet minimum requirements.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL

4.008 - Auditing must be configured as required. - 'Account Management -> User Account Management'DISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

4.008 - Auditing must be configured as required. - 'Logon/Logoff -> Special Logon' successes.DISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

4.008 - Auditing must be configured as required. - System -> Security System Extension'DISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

4.010 - User rights assignments must meet minimum requirements. - Allow log on through Terminal ServicesDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Create permanent shared objectsDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Force shutdown from a remote systemDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Impersonate a client after authenticationDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Load and unload device driversDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Log on as a batch jobDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Replace a process level tokenDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.010 - User rights assignments must meet minimum requirements. - Restore files and directoriesDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

4.020 - The built-in guest account is not disabled.DISA Windows Vista STIG v6r41Windows

IDENTIFICATION AND AUTHENTICATION

5.002 - Event log sizes do not meet minimum requirements. - ApplicationDISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

5.002 - Event log sizes do not meet minimum requirements. - SetupDISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

5.004 - Installed FTP server is configured to allow prohibited logins.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

5.044 - Terminal Services is configured to use a common temporary folder for all sessions.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

5.107 - A Windows system has an incorrect default DCOM authorization level. - NoneDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

5.116 - Terminal Services / Remote Desktop Service - Prevent password saving in the Remote Desktop ClientDISA Windows Vista STIG v6r41Windows

IDENTIFICATION AND AUTHENTICATION

5.118 - Terminal Services / Remote Desktop Services - Local drives prevented from sharing with Terminal Servers.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN004930 - The ftpusers file must be group-owned by bin, sys, or system.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005120 - The TFTP daemon must be configured to vendor specs including a home directory owned by the TFTP user - 'tftp user exists'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005190 - The .Xauthority files must not have extended ACLs.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005320 - The snmpd.conf file must have mode 0600 or less permissive - '/etc/snmpdv3.conf'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005360 - The snmpd.conf file must be owned by root - '/etc/snmpd.conf'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005440 - The system must not be used as a syslog server (loghost) for systems external to the enclave.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN005523 - The SSH private host key files must have mode 0600 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005538 - The SSH daemon must not allow rhosts RSA authentication.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006160 - The /var/private/smbpasswd file must be owned by root.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006225 - Samba must be configured to use an authentication mechanism other than share.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006235 - Samba must be configured to not allow guest access to shares.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006270 - The /etc/news/hosts.nntp file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006280 - The /etc/news/hosts.nntp.nolimit (or equivalent) must have mode 0600 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006290 - The /etc/news/hosts.nntp.nolimit file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006320 - The /etc/news/passwd.nntp file (or equivalent) must have mode 0600 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006340 - Files in /etc/news must be owned by root or news.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN006580 - The system must use an access control program.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006600 - The system's access control program must log each system access attempt - 'mail.debug'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - '/etc/hosts.deny'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006640 - The system must use and update a DoD-approved virus scan program - 'clean.dat'DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN007880 - The system must not send IPv6 ICMP redirects.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007940 - The system must not accept source-routed IPv6 packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN008100 - If the system is using LDAP the /etc/ldap.conf file must be group-owned by security, bin, sys, or systemDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN008160 - The TLS certificate authority file and/or directory (as appropriate) must be group-owned by root, bin, sys, or systemDISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL