Item Search

NameAudit NamePluginCategory
APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - fdDISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - fmDISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - frDISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - frDISA STIG Apple macOS 11 v1r5Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-11-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system - fwDISA STIG Apple macOS 11 v1r8Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-12-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.DISA STIG Apple macOS 12 v1r9Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-13-001020 - The macOS system must audit the enforcement actions used to restrict access associated with changes to the system.DISA STIG Apple macOS 13 v1r4Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

APPL-14-001100 - The macOS system must disable root logon for SSH.DISA Apple macOS 14 (Sonoma) STIG v2r1Unix

CONFIGURATION MANAGEMENT

APPL-15-001100 - The macOS system must disable root login for SSH.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

CONFIGURATION MANAGEMENT

Big Sur - Configure Sudoers to Authenticate Users on a Per -tty BasisNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Disable the Guest AccountNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Configure Sudoers to Authenticate Users on a Per -tty BasisNIST macOS Catalina v1.5.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

DTAM141 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent modification of McAfee files and settings.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM141 - McAfee VirusScan Access Protection: Common Standard Protection must be set to prevent modification of McAfee files and settings.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM142 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent modification of McAfee Common Management Agent files and settings.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM142 - McAfee VirusScan Access Protection: Common Standard Protection must be set to prevent modification of McAfee Common Management Agent files and settings.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM143 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent modification of McAfee Scan Engine files and settings.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM143 - McAfee VirusScan Access Protection: Common Standard Protection must be set to prevent modification of McAfee Scan Engine files and settings.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

ESXI-06-100001 - The system must enable lockdown mode to restrict remote access.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events BACKUP_Export exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events FS_Chroot exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events RESTORE_Import exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_Create exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_SetEnv exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - 'User audit class assignments should be reviewed'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760-2 - The audit system must be configured to audit all administrative, privileged, and security actions - '/etc/audit.rules'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-3 - The audit system must be configured to audit all administrative, privileged, and security actions - 'adjtimex'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-4 - The audit system must be configured to audit all administrative, privileged, and security actions - 'settimeofday'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-6 - The audit system must be configured to audit all administrative, privileged, and security actions - 'clock_settime'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-7 - The audit system must be configured to audit all administrative, privileged, and security actions - 'sethostname'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-8 - The audit system must be configured to audit all administrative, privileged, and security actions - 'setdomain'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-9 - The audit system must be configured to audit all administrative, privileged, and security actions - 'sched_setparam'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002760-10 - The audit system must be configured to audit all administrative, privileged, and security actions - 'sched_setscheduler'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - 'faillog'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - 'lastlog'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

RHEL-09-255135 - RHEL 9 SSH daemon must not allow GSSAPI authentication.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT

VCEM-70-000017 - ESX Agent Manager directory tree must have permissions in an out-of-the-box state - out-of-the box state.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

VCLU-70-000017 - Lookup Service directory tree must have permissions in an out-of-the-box state - out-of-the box state.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

VCST-67-000017 - The Security Token Service directory tree must have permissions in an 'out-of-the-box' state - out-of-the-box state.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

VCST-70-000017 - The Security Token Service directory tree must have permissions in an out-of-the-box state.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

VCUI-67-000016 - vSphere UI directory tree must have permissions in an 'out-of-the-box' state - out-of-the-box state.DISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

VCUI-70-000017 - The vSphere UI directory tree must have permissions in an out-of-the-box state.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION