3.130 - User Account Control - Behavior of elevation prompt for administrators | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.132 - User Account Control - Detect Application Installations | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.134 - User Account Control - Elevate UIAccess applications that are in secure locations | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.135 - User Account Control - Switch to secure desktop | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.136 - User Account Control - Non UAC Compliant Application Virtualization | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.136 - User Account Control - Non UAC Compliant Application Virtualization | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.136 - User Account Control - Non UAC compliant applications run in virtualized file and registry entries. | DISA Windows 7 STIG v1r32 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.136 - User Account Control will virtualize file and registry write failures to per-user locations. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.140 - UAC - All application are elevated. | DISA Windows 7 STIG v1r32 | Windows | SYSTEM AND INFORMATION INTEGRITY |
3.140 - Windows will elevate all applications in User Account Control, not just signed ones. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | SYSTEM AND INFORMATION INTEGRITY |
3.140 - Windows will elevate all applications in User Account Control, not just signed ones. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | SYSTEM AND INFORMATION INTEGRITY |
3.141 - User Account Control - Executable Elevation | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
5.132 - Require username and password to elevate a running application. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBI356-IE11 - The 64-bit tab processes, when running in Enhanced Protected Mode on 64-bit versions of Windows, must be turned on. | DISA STIG IE 11 v1r19 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBI356-IE11 - The 64-bit tab processes, when running in Enhanced Protected Mode on 64-bit versions of Windows, must be turned on. | DISA STIG IE 11 v1r18 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBI995-IE11 - Enhanced Protected Mode functionality must be enforced. | DISA STIG IE 11 v1r19 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DTBI995-IE11 - Enhanced Protected Mode functionality must be enforced. | DISA STIG IE 11 v1r18 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
OH12-1X-000281 - OHS must have the DocumentRoot directive set to a separate partition from the OHS system files. | DISA STIG Oracle HTTP Server 12.1.3 v1r6 | Unix | SYSTEM AND INFORMATION INTEGRITY |
OH12-1X-000282 - OHS must have the Directory directive accompanying the DocumentRoot directive set to a separate partition from the OHS system files. | DISA STIG Oracle HTTP Server 12.1.3 v1r6 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
OL08-00-010170 - OL 8 must use a Linux Security Module configured to enforce limits on system services. | DISA Oracle Linux 8 STIG v1r10 | Unix | |
OL08-00-010170 - OL 8 must use a Linux Security Module configured to enforce limits on system services. | DISA Oracle Linux 8 STIG v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
OL08-00-010171 - OL 8 must have the 'policycoreutils' package installed. | DISA Oracle Linux 8 STIG v1r10 | Unix | |
RHEL-08-010170 - RHEL 8 must use a Linux Security Module configured to enforce limits on system services. | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
RHEL-08-010171 - RHEL 8 must have policycoreutils package installed. | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - /etc/default/grub | DISA Red Hat Enterprise Linux 8 STIG v1r8 | Unix | |
RHEL-08-010423 - RHEL 8 must clear SLUB/SLAB objects to prevent use-after-free attacks - grub2-editenv | DISA Red Hat Enterprise Linux 8 STIG v1r9 | Unix | |
RHEL-09-212035 - RHEL 9 must disable virtual system calls. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
RHEL-09-212035 - RHEL 9 must disable virtual system calls. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | |
RHEL-09-212035 - RHEL 9 must disable virtual system calls. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-212040 - RHEL 9 must clear the page allocator to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
RHEL-09-212040 - RHEL 9 must clear the page allocator to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-212040 - RHEL 9 must clear the page allocator to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | |
RHEL-09-212045 - RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-212045 - RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | |
RHEL-09-212045 - RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
RHEL-09-431010 - RHEL 9 must use a Linux Security Module configured to enforce limits on system services. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | |
RHEL-09-431010 - RHEL 9 must use a Linux Security Module configured to enforce limits on system services. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-431025 - RHEL 9 must have policycoreutils package installed. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | |
RHEL-09-431025 - RHEL 9 must have policycoreutils package installed. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-431025 - RHEL 9 must have policycoreutils package installed. | DISA Red Hat Enterprise Linux 9 STIG v1r2 | Unix | |
UBTU-20-010012 - The Ubuntu operating system must ensure only users who need access to security functions are part of sudo group. | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
VCTR-67-000051 - The vCenter Server users must have the correct roles assigned. | DISA STIG VMware vSphere 6.7 vCenter v1r2 | VMware | |
WINRG-000003 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN10-SO-000275 - User Account Control must virtualize file and registry write failures to per-user locations. | DISA Windows 10 STIG v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN11-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems. | DISA Windows 11 STIG v1r4 | Windows | |
WN11-SO-000250 - User Account Control must prompt administrators for consent on the secure desktop. | DISA Windows 11 STIG v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN11-SO-000265 - User Account Control must only elevate UIAccess applications that are installed in secure locations. | DISA Windows 11 STIG v1r4 | Windows | |
WN22-MS-000020 - Windows Server 2022 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers. | DISA Windows Server 2022 STIG v1r5 | Windows | |
WN22-SO-000420 - Windows Server 2022 User Account Control (UAC) must be configured to detect application installations and prompt for elevation. | DISA Windows Server 2022 STIG v1r5 | Windows | |
WN22-SO-000450 - Windows Server 2022 User Account Control (UAC) must virtualize file and registry write failures to per-user locations. | DISA Windows Server 2022 STIG v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |