Item Search

NameAudit NamePluginCategory
AIX7-00-002200 - The AIX audit configuration files must be owned by root.DISA STIG AIX 7.x v2r3Unix

CONFIGURATION MANAGEMENT

AIX7-00-002201 - The AIX audit configuration files must be group-owned by audit.DISA STIG AIX 7.x v2r3Unix

CONFIGURATION MANAGEMENT

AIX7-00-002201 - The AIX audit configuration files must be group-owned by audit.DISA STIG AIX 7.x v2r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002202 - The AIX audit configuration files must be set to 640 or less permissive.DISA STIG AIX 7.x v2r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002202 - The AIX audit configuration files must be set to 640 or less permissive.DISA STIG AIX 7.x v2r3Unix

CONFIGURATION MANAGEMENT

APPL-14-001110 - The macOS system must configure audit_control group to wheel.DISA Apple macOS 14 (Sonoma) STIG v1r2Unix
APPL-14-001120 - The macOS system must configure audit_control owner to root.DISA Apple macOS 14 (Sonoma) STIG v1r2Unix
APPL-14-001130 - The macOS system must configure audit_control to mode 440 or less permissive.DISA Apple macOS 14 (Sonoma) STIG v1r2Unix
APPL-14-001140 - The macOS system must configure audit_control to not contain access control lists.DISA Apple macOS 14 (Sonoma) STIG v1r2Unix
ESXI-67-000030 - The ESXi host must produce audit records containing information to establish what type of events occurred.DISA STIG VMware vSphere 6.7 ESXi v1r1VMware

AUDIT AND ACCOUNTABILITY

JUSX-DM-000019 - For local accounts, the Juniper SRX Services Gateway must generate an alert message to the management console and generate a log event record that can be forwarded to the ISSO and designated system administrators when local accounts are created.DISA Juniper SRX Services Gateway NDM v3r1Juniper

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - ConfigDISA STIG PostgreSQL 9.x on RHEL OS v2r2Unix

CONFIGURATION MANAGEMENT

PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - DataDISA STIG PostgreSQL 9.x on RHEL DB v2r1Unix

CONFIGURATION MANAGEMENT

PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - DataDISA STIG PostgreSQL 9.x on RHEL OS v2r2Unix

CONFIGURATION MANAGEMENT

PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - RolesDISA STIG PostgreSQL 9.x on RHEL DB v2r1Unix

AUDIT AND ACCOUNTABILITY

PGS9-00-002600 - PostgreSQL must allow only the ISSM (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - RolesDISA STIG PostgreSQL 9.x on RHEL OS v2r2Unix

AUDIT AND ACCOUNTABILITY

SPLK-CL-000270 - Splunk Enterprise must allow only the information system security manager (ISSM) (or individuals or roles appointed by the ISSM) to be assigned to the Power User role - or individuals or roles appointed by the ISSM to be assigned to the Power User role.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

UBTU-16-020150 - The Ubuntu operating system must allow only the Information System Security Manager (ISSM) (or individuals or roles appointed by the ISSM) to select which auditable events are to be audited - audit.rulesDISA STIG Ubuntu 16.04 LTS v2r1Unix

CONFIGURATION MANAGEMENT

UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - audit.rulesDISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - audit.rulesDISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - auditd.confDISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - auditd.confDISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - rules.d/*DISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010311 - The Ubuntu operating system must be configured so that audit configuration files are not write-accessible by unauthorized users - rules.d/*DISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - audit.rulesDISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - audit.rulesDISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - auditd.confDISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - auditd.confDISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - rules.d/*DISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010312 - The Ubuntu operating system must permit only authorized accounts to own the audit configuration files - rules.d/*DISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rulesDISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - audit.rulesDISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - auditd.confDISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - auditd.confDISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - rules.d/*DISA STIG Ubuntu 18.04 LTS v2r2Unix

CONFIGURATION MANAGEMENT

UBTU-18-010313 - The Ubuntu operating system must permit only authorized groups to own the audit configuration files - rules.d/*DISA STIG Ubuntu 18.04 LTS v2r4Unix

CONFIGURATION MANAGEMENT

WBSP-AS-000090 - The WebSphere Application Server users WebSphere auditor role must be configured in accordance with System Security Plan.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - manageDISA Microsoft Windows 2012 Server DNS STIG v2r4Windows

ACCESS CONTROL

WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - manageDISA Microsoft Windows 2012 Server DNS STIG v2r1Windows

ACCESS CONTROL

WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - permissionsDISA Microsoft Windows 2012 Server DNS STIG v2r1Windows

AUDIT AND ACCOUNTABILITY

WDNS-AU-000007 - The Windows 2012 DNS Server logging criteria must only be configured by the ISSM or individuals appointed by the ISSM - permissionsDISA Microsoft Windows 2012 Server DNS STIG v2r4Windows

AUDIT AND ACCOUNTABILITY

WINUR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right.DISA Windows Server 2008 R2 DC STIG v1r34Windows

ACCESS CONTROL

WINUR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right.DISA Windows Server 2008 R2 MS STIG v1r33Windows

ACCESS CONTROL

WINUR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right.DISA Windows 7 STIG v1r32Windows

ACCESS CONTROL

WN08-UR-000032 - Unauthorized accounts must not have the Manage auditing and security log user right.DISA Windows 8/8.1 STIG v1r23Windows

ACCESS CONTROL

WN10-UR-000130 - The Manage auditing and security log user right must only be assigned to the Administrators group.DISA Windows 10 STIG v2r4Windows
WN10-UR-000130 - The Manage auditing and security log user right must only be assigned to the Administrators group.DISA Windows 10 STIG v2r7Windows
WN12-UR-000032 - The Manage auditing and security log user right must only be assigned to the Administrators group.DISA Windows Server 2012 and 2012 R2 MS STIG v3r6Windows
WN16-UR-000260 - The Manage auditing and security log user right must only be assigned to the Administrators group.DISA Windows Server 2016 STIG v2r7Windows
WN16-UR-000260 - The Manage auditing and security log user right must only be assigned to the Administrators group.DISA Windows Server 2016 STIG v2r4Windows