Item Search

NameAudit NamePluginCategory
APPL-14-002022 The macOS system must disable Remote Apple Events.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

APPL-14-002110 The macOS system must disable Bluetooth sharing.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

APPL-15-002006 - The macOS system must disable Unix-to-Unix Copy Protocol (UUCP) service.DISA Apple macOS 15 (Sequoia) STIG v1r2Unix

ACCESS CONTROL

APPL-15-002050 - The macOS system must disable Screen Sharing and Apple Remote Desktop.DISA Apple macOS 15 (Sequoia) STIG v1r2Unix

ACCESS CONTROL

CNTR-K8-000310 - The Kubernetes Controller Manager must have secure binding.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000330 - The Kubernetes Kubelet must have the 'readOnlyPort' flag disabled - readOnlyPort flag disabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000370 - The Kubernetes Kubelet must have anonymous authentication disabled.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-K8-000440 - The Kubernetes kubelet staticPodPath must not enable static pods.DISA STIG Kubernetes v2r2Unix

ACCESS CONTROL

CNTR-R2-000100 The Kubernetes Controller Manager must have secure binding.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

CNTR-R2-000120 The Kubernetes API server must have the insecure port flag disabled.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

CNTR-R2-000150 The Kubernetes kubelet must enable explicit authorization.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

ACCESS CONTROL

DTAM144 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent termination of McAfee processes.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

ACCESS CONTROL

DTAM144 - McAfee VirusScan Access Protection: Common Standard Protection must be set to prevent termination of McAfee processes.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

ACCESS CONTROL

DTOO208 - Office client polling of SharePoint servers published links must be disabled.DISA STIG Microsoft Office System 2013 v2r2Windows

ACCESS CONTROL

EX19-MB-000020 - Exchange must have authenticated access set to integrated Windows authentication only.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2Windows

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008620 - BIOS or system controllers supporting password protection must have administrator accounts/passwords configured and no others.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have admin accounts/passwords configured, and no others.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/grub.conf'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/grub.conf'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/menu.lst'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication - '/boot/grub/menu.lst'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008700 - The system boot loader must require authentication.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

MYS8-00-005400 - The MySQL Database Server 8.0 must enforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.DISA Oracle MySQL 8.0 v2r2 DBMySQLDB

ACCESS CONTROL

OL07-00-010483 - Oracle Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.DISA Oracle Linux 7 STIG v3r1Unix

ACCESS CONTROL

OL07-00-010492 - Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Oracle Linux 7 STIG v3r1Unix

ACCESS CONTROL

OL08-00-010140 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance.DISA Oracle Linux 8 STIG v2r2Unix

ACCESS CONTROL

RHEL-07-010483 - Red Hat Enterprise Linux operating systems version 7.2 or newer booted with a BIOS must have a unique name for the grub superusers account when booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-010492 - Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-08-010150 - RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

SYMP-AG-000060 - Symantec ProxySG must implement security policies that enforce approved authorizations for logical access to information and system resources by employing identity-based, role-based, and/or attribute-based security policies.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

SYMP-NM-000030 - Symantec ProxySG must configure Web Management Console access restrictions to authorized IP address/ranges.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

ACCESS CONTROL

WBSP-AS-000212 - The WebSphere Application Server Java 2 security must not be bypassed.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000230 - The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

WBSP-AS-000230 - The WebSphere Application Server LDAP groups must be authorized for the WebSphere role.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

WN11-UR-000070 - The 'Deny access to this computer from the network' user right on workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN11-UR-000085 - The 'Deny log on locally' user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN22-DC-000380 - Windows Server 2022 Deny log on as a batch job user right on domain controllers must be configured to prevent unauthenticated access.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-DC-000400 - Windows Server 2022 Deny log on locally user right on domain controllers must be configured to prevent unauthenticated access.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL

WN22-DC-000405 - Windows Server 2022 must be configured for certificate-based authentication for domain controllers.DISA Microsoft Windows Server 2022 STIG v2r3Windows

ACCESS CONTROL