GEN000000-AIX0200 - The system must not allow directed broadcasts to gateway. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN000100-ESXI5-000062 - The operating system must be a supported release. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |
GEN000360 - Group Identifiers (GIDs) reserved for system accounts must not be assigned to non-system groups. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN000880 - The root account must be the only account having an UID of 0. | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001140 - System files and directories must not have uneven access permissions - '/bin' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001190 - All network services daemon files must not have extended ACLs - /usr/sbin/* | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001240 - System files, programs, and directories must be group-owned by a system group - '/etc/*' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001240 - System files, programs, and directories must be group-owned by a system group - '/usr/bin/*' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001240 - System files, programs, and directories must be group-owned by a system group - '/usr/sbin/*' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001260 - System log files must have mode 0640 or less permissive - '/var/log/syslog/*' | DISA STIG AIX 5.3 v1r2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
GEN001290 - All manual page files must not have extended ACLs - '/usr/share/info/*' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001310 - All library files must not have extended ACLs - '/usr/lib/*' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001360 - The NIS/NIS+/yp files must have mode 0755 or less permissive - '/usr/lib/netsvc/yp/*' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001360 - The NIS/NIS+/yp files must have mode 0755 or less permissive - '/var/yp/*' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001391 - The /etc/group file must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001440 - All interactive users must be assigned a home directory in the /etc/passwd file. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001490 - User home directories must not have extended ACLs. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001590 - All run control scripts must have no extended ACLs - '/etc/init.d' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001660 - All system start-up files must be owned by root. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/bashrc' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/csh.cshrc' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001730 - All global initialization files must not have extended ACLs - '/etc/csh.login' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001780 - Global initialization files must contain the mesg -n or mesg n commands. - '/etc/bashrc' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN001800 - All skeleton files (typically those in /etc/skel) must have mode 0644 or less permissive - '/etc/security/.profile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.dtprofile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.exrc' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001870 - Local initialization files must be group-owned by the user's primary group or root - '~/.logout' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.bash_profile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.dispatch' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.dtprofile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001890 - Local initialization files must not have extended ACLs - '.profile' | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN001980 - The .rhosts file must not contain a plus (+) without defining entries for NIS+ netgroups - '~/.rhosts' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN005536-ESXI5-000110 - The SSH daemon must perform strict mode checking of home directory configuration files. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |
SLES-12-010530 - The SUSE operating system file integrity tool must be configured to verify extended attributes. | DISA SLES 12 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-010680 - The SUSE operating system must configure the Linux Pluggable Authentication Modules (PAM) to prohibit the use of cached offline authentications after one day. | DISA SLES 12 STIG v3r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010690 - All SUSE operating system files and directories must have a valid owner. | DISA SLES 12 STIG v3r1 | Unix | ACCESS CONTROL |
SLES-12-010760 - All SUSE operating system local initialization files must have mode 0740 or less permissive. | DISA SLES 12 STIG v3r1 | Unix | CONFIGURATION MANAGEMENT |
SLES-12-020090 - Audispd must off-load audit records onto a different system or media from the SUSE operating system being audited. | DISA SLES 12 STIG v3r1 | Unix | AUDIT AND ACCOUNTABILITY |
SRG-OS-000163-ESXI5 - The operating system must terminate the network connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-SO-000180 - NTLM must be prevented from falling back to a Null session. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-SO-000185 - PKU2U authentication using online identities must be prevented. | DISA Windows 10 STIG v3r2 | Windows | CONFIGURATION MANAGEMENT |
WN10-UR-000060 - The Create symbolic links user right must only be assigned to the Administrators group. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN11-00-000095 - Permissions for system files and directories must conform to minimum requirements. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN11-00-000105 - Simple Network Management Protocol (SNMP) must not be installed on the system. | DISA Windows 11 STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
WN11-00-000110 - Simple TCP/IP Services must not be installed on the system. | DISA Windows 11 STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
WN11-00-000175 - The Secondary Logon service must be disabled on Windows 11. | DISA Windows 11 STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
WN11-CC-000040 - Insecure logons to an SMB server must be disabled. | DISA Windows 11 STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
WN11-CC-000290 - Remote Desktop Services must be configured with the client connection encryption set to the required level. | DISA Windows 11 STIG v2r2 | Windows | ACCESS CONTROL |
WN11-CC-000295 - Attachments must be prevented from being downloaded from RSS feeds. | DISA Windows 11 STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
WN11-CC-000330 - The Windows Remote Management (WinRM) client must not use Basic authentication. | DISA Windows 11 STIG v2r2 | Windows | MAINTENANCE |