Item Search

NameAudit NamePluginCategory
BIND-9X-000001 - A BIND 9.x server implementation must be running in a chroot(ed) directory structure.DISA BIND 9.x STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

DB2X-00-005600 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

SYSTEM AND COMMUNICATIONS PROTECTION

GEN002300 - Device files used for backup must only be readable and/or writable by root or the backup user.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002340 - Audio devices must be owned by root - '/dev/snd/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN002520 - All public directories must be owned by root or an application account.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN003581 - Network interfaces must not be configured to allow user control.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004480 - The SMTP service log file must be owned by root.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004500 - The SMTP service log file must have mode 0644 or less permissive.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN004900 - The ftpusers file must contain account names not allowed to use FTP.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000460 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MD3X-00-000470 - MongoDB must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-003900 - The DBMS must restrict access to system tables and other configuration information or metadata to DBAs or other authorized users.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-012500 - DBMS backup and restoration files must be protected from unauthorized access.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-018900 - The DBMS must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-011900 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010460 - The sticky bit must be set on all SUSE operating system world-writable directories.DISA SLES 12 STIG v3r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-021800 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-002000 - Database contents must be protected from unauthorized and unintended information transfer by enforcement of a data-transfer policy.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-009800 - SQL Server must prevent unauthorized and unintended information transfer via shared system resources.DISA STIG SQL Server 2016 Instance DB Audit v3r2MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-009900 - SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).DISA STIG SQL Server 2016 Instance OS Audit v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-010000 - Access to database files must be limited to relevant processes and to authorized, administrative users.DISA STIG SQL Server 2016 Instance OS Audit v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-010410 - All public directories must be owned by root to prevent unauthorized and unintended information transferred via shared system resources.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-010420 - All world-writable directories must be group-owned by root, sys, bin, or an application group.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-030070 - A sticky bit must be set on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA STIG Ubuntu 16.04 LTS v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-18-010120 - The Ubuntu operating system must set a sticky bit on all public directories to prevent unauthorized and unintended information transferred via shared system resources.DISA STIG Ubuntu 18.04 LTS v2r15Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-00-000060 - Non system-created file shares on a system must limit access to groups that require it.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-EP-000310 - Windows 10 Kernel (Direct Memory Access) DMA Protection must be enabled.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000150 - Anonymous enumeration of shares must be restricted.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000058 - The system must be configured to prevent unsolicited remote assistance offers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000059 - Solicited Remote Assistance must not be allowed.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000059 - Solicited Remote Assistance must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000098 - Local drives must be prevented from sharing with Remote Desktop Session Hosts. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000098 - Local drives must be prevented from sharing with Remote Desktop Session Hosts. (Remote Desktop Services Role).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-GE-000018 - Non system-created file shares on a system must limit access to groups that require it.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000052 - Anonymous enumeration of shares must be restricted.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000052 - Anonymous enumeration of shares must be restricted.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-DC - Named pipes that can be accessed anonymously must be configured with limited values on domain controllers.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000055-MS - Named pipes that can be accessed anonymously must be configured to contain no values on member servers.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000058 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000058 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000059 - Network shares that can be accessed anonymously must not be allowed.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000059 - Network shares that can be accessed anonymously must not be allowed.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000060 - The system must be configured to use the Classic security model.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000060 - The system must be configured to use the Classic security model.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-00-000250 - Non-system-created file shares on a system must limit access to groups that require it.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-CC-000380 - Local drives must be prevented from sharing with Remote Desktop Session Hosts.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000270 - Anonymous enumeration of shares must not be allowed.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000300 - Anonymous access to Named Pipes and Shares must be restricted.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000350 - Windows Server 2019 Remote Desktop Services must prevent drive redirection.DISA Microsoft Windows Server 2019 STIG v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000250 - Windows Server 2019 must restrict anonymous access to Named Pipes and Shares.DISA Microsoft Windows Server 2019 STIG v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION