Item Search

NameAudit NamePluginCategory
GEN000000-AIX0090 - The /etc/netsvc.conf file must be group-owned by bin, sys, or system.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN000220 - A file integrity tool must be used at least weekly to check for unauthorized file changes.DISA STIG AIX 5.3 v1r2Unix

RISK ASSESSMENT

GEN000242 - The system must use at least two time sources for clock synchronization - 'at least 2 servers are configured'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN001120 - The system must not permit root logins using remote access programs, such as ssh.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN001200 - All system command files must have mode 0755 or less permissive - '/bin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001200 - All system command files must have mode 0755 or less permissive - '/etc/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001200 - All system command files must have mode 0755 or less permissive - '/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001200 - All system command files must have mode 0755 or less permissive - '/usr/bin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001200 - All system command files must have mode 0755 or less permissive - '/usr/lbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001210 - All system command files must not have extended ACLs - '/etc/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001210 - All system command files must not have extended ACLs - '/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001210 - All system command files must not have extended ACLs - '/usr/lbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001220 - All system files, programs, and directories must be owned by a system account - '/usr/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001240 - System files, programs, and directories must be group-owned by a system group - '/etc/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001240 - System files, programs, and directories must be group-owned by a system group - '/usr/bin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001240 - System files, programs, and directories must be group-owned by a system group - '/usr/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001300 - Library files must have mode 0755 or less permissive - '/lib/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001310 - All library files must not have extended ACLs - '/usr/lib/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config DEV_Configure exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config DEV_Create exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Fchpriv exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Owner exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FS_Chroot exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FS_Umount exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config PASSWORD_Check exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config PROC_Privilege exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config TCBCK_Delete exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config USER_Change exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config USER_Reboot exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config USER_Remove exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config USER_SetEnv exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events ACCT_Disable exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events DEV_Configure exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_SetUserIDs exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - 'User audit class assignments should be reviewed'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN006460 - Any NIS+ server must be operating at security level 2.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009160 - The system must not have the Calendar Manager Service Daemon (CMSD) service active.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009190 - The system must not have the comsat service active.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009320 - The system must not have the sprayd service active.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN009330 - The system must not have the rstatd service active.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - thunderbird.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINCC-000081 - EMET Default Protections for Popular Software must be enabled. - winamp.exeDISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINER-000001 - The Windows Error Reporting Service must be running and configured to start automatically.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINER-000012 - The maximum number of error reports to archive on a system must be configured to 100 or greater.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINER-000014 - The system must be configured to add all error reports to the queue.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINER-000015 - The maximum number of error reports to queue on a system must be configured to 50 or greater.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINER-000018 - The system must be configured to permit the default consent levels of Windows Error Reporting to override.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WINFW-000001 - A host-based firewall must be installed and enabled on the system.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

WINRG-000003 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WINUR-000020 - The Deny log on locally user right must be configured to prevent access from highly privileged accounts.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL