Item Search

NameAudit NamePluginCategory
AIX7-00-002100 - AIX must monitor and record successful remote logins.DISA STIG AIX 7.x v2r1Unix

ACCESS CONTROL

AIX7-00-002100 - AIX must monitor and record successful remote logins.DISA STIG AIX 7.x v2r9Unix

ACCESS CONTROL

AIX7-00-002101 - AIX must monitor and record unsuccessful remote logins.DISA STIG AIX 7.x v2r3Unix

ACCESS CONTROL

AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Server v2r7Unix

ACCESS CONTROL

AS24-U1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Server v2r3Unix

ACCESS CONTROL

AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Site v2r1Unix

ACCESS CONTROL

AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Site v2r2Unix

ACCESS CONTROL

AS24-U2-000680 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Unix Site v2r2 MiddlewareUnix

ACCESS CONTROL

AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

ACCESS CONTROL

AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Windows Server v2r1Windows

ACCESS CONTROL

AS24-W1-000670 - The Apache web server must restrict inbound connections from nonsecure zones.DISA STIG Apache Server 2.4 Windows Server v2r2Windows

ACCESS CONTROL

ESXI-67-000004 - Remote logging for ESXi hosts must be configured.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

F5BI-AP-000153 - The BIG-IP APM module access policy profile must control remote access methods to virtual servers.DISA F5 BIG-IP Access Policy Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000031 - The BIG-IP Core implementation must be configured to monitor inbound traffic for remote access policy compliance when accepting connections to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

F5BI-LT-000153 - The BIG-IP Core implementation providing intermediary services for remote access communications traffic must control remote access methods to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r3F5

ACCESS CONTROL

IIST-SV-000142 - The IIS 10.0 web server must restrict inbound connections from non-secure zones.DISA IIS 10.0 Server v2r10Windows

ACCESS CONTROL

JUSX-VN-000004 - The Juniper SRX Services Gateway VPN device also fulfills the role of IDPS in the architecture, the device must inspect the VPN traffic in compliance with DoD IDPS requirements.DISA Juniper SRX Services Gateway VPN v2r2Juniper

ACCESS CONTROL

OH12-1X-000020 - OHS must have the OraLogMode set to Oracle Diagnostic Logging text mode to generate information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

OH12-1X-000022 - OHS must have the OraLogSeverity directive defined to generate adequate information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

OH12-1X-000024 - OHS must have a log format defined to generate adequate information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

OH12-1X-000025 - OHS must have a SSL log format defined to allow generated information to be used by external applications or entities to monitor and control remote access in accordance with the categorization of data hosted by the web server.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

OH12-1X-000026 - OHS must have a log file defined for each site/virtual host to capture information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

ACCESS CONTROL

PANW-AG-000015 - The Palo Alto Networks security platform, if used to provide intermediary services for remote access communications traffic (TLS or SSL decryption), must ensure inbound and outbound traffic is monitored for compliance with remote access security policies - TLS/SSL must monitor traffic.DISA STIG Palo Alto ALG v2r4Palo_Alto

ACCESS CONTROL

PANW-AG-000078 - The Palo Alto Networks security platform, if used as a TLS gateway/decryption point or VPN concentrator, must control remote access methods (inspect and filter traffic).DISA STIG Palo Alto ALG v2r4Palo_Alto

ACCESS CONTROL

SP13-00-000025 - SharePoint must ensure remote sessions for accessing security functions and security-relevant information are audited.DISA STIG SharePoint 2013 v2r3Windows

ACCESS CONTROL

TCAT-AS-001020 - LockOutRealms must be used for management of Tomcat.DISA STIG Apache Tomcat Application Server 9 v2r7Unix

ACCESS CONTROL

TCAT-AS-001020 - LockOutRealms must be used for management of Tomcat.DISA STIG Apache Tomcat Application Server 9 v2r7 MiddlewareUnix

ACCESS CONTROL

UBTU-16-030030 - An application firewall must be installed.DISA STIG Ubuntu 16.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-16-030030 - An application firewall must be installed.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

UBTU-16-030450 - All remote access methods must be monitored - authDISA STIG Ubuntu 16.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-16-030450 - All remote access methods must be monitored - authprivDISA STIG Ubuntu 16.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-16-030450 - All remote access methods must be monitored - authprivDISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

UBTU-18-010023 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.DISA STIG Ubuntu 18.04 LTS v2r4Unix

ACCESS CONTROL

UBTU-18-010023 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.DISA STIG Ubuntu 18.04 LTS v2r14Unix

ACCESS CONTROL

UBTU-18-010410 - The Ubuntu operating system must monitor remote access methods - authDISA STIG Ubuntu 18.04 LTS v2r4Unix

ACCESS CONTROL

UBTU-18-010410 - The Ubuntu operating system must monitor remote access methods - daemon.noticeDISA STIG Ubuntu 18.04 LTS v2r4Unix

ACCESS CONTROL

VCLD-67-000004 - VAMI must be configured to monitor remote access.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

VCLD-70-000004 - VAMI must be configured to monitor remote access.DISA STIG VMware vSphere 7.0 VAMI v1r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WBLC-01-000011 - Oracle WebLogic must employ automated mechanisms to facilitate the monitoring and control of remote access methods.Oracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

ACCESS CONTROL

WBLC-01-000011 - Oracle WebLogic must employ automated mechanisms to facilitate the monitoring and control of remote access methods.Oracle WebLogic Server 12c Linux v2r1Unix

ACCESS CONTROL

WBLC-01-000013 - Oracle WebLogic must ensure remote sessions for accessing security functions and security-relevant information are audited.Oracle WebLogic Server 12c Windows v2r1Windows

ACCESS CONTROL

WBLC-01-000013 - Oracle WebLogic must ensure remote sessions for accessing security functions and security-relevant information are audited.Oracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

ACCESS CONTROL

WN12-CC-000133 - Users must be prevented from mapping local LPT ports and redirecting data from the Remote Desktop Session Host to local LPT ports. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-CC-000134 - The system must be configured to ensure smart card devices can be redirected to the Remote Desktop session. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN12-CC-000134 - The system must be configured to ensure smart card devices can be redirected to the Remote Desktop session. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 MS STIG v3r3Windows

ACCESS CONTROL

WN12-CC-000134 - The system must be configured to ensure smart card devices can be redirected to the Remote Desktop session. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r2Windows

ACCESS CONTROL

WN12-CC-000134 - The system must be configured to ensure smart card devices can be redirected to the Remote Desktop session. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r3Windows

ACCESS CONTROL

WN12-CC-000135 - Users must be prevented from redirecting Plug and Play devices to the Remote Desktop Session Host. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL

WN19-DC-000410 - Windows Server 2019 Deny log on through Remote Desktop Services user right on domain controllers must be configured to prevent unauthenticated access.DISA Windows Server 2019 STIG v2r9Windows

ACCESS CONTROL

WN19-MS-000120 - Windows Server 2019 'Deny log on through Remote Desktop Services' user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems - Deny log on through Remote Desktop Services user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.DISA Windows Server 2019 STIG v2r9Windows

ACCESS CONTROL