3.129 - User Account Control - Built In Admin Approval Mode | DISA Windows Server 2008 MS STIG v6r46 | Windows | ACCESS CONTROL |
3.129 - User Account Control - Built In Admin Approval Mode | DISA Windows Server 2008 DC STIG v6r47 | Windows | ACCESS CONTROL |
3.129 - User Account Control approval mode for the built-in Administrator will be enabled. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | ACCESS CONTROL |
3.131 - User Account Control - Behavior of elevation prompt for standard users. | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.131 - User Account Control - Behavior of elevation prompt for standard users. | DISA Windows Server 2008 DC STIG v6r47 | Windows | ACCESS CONTROL |
3.131 - User Account Control must automatically deny elevation requests for standard users. | DISA Windows 7 STIG v1r32 | Windows | ACCESS CONTROL |
3.131 - User Account Control will automatically deny standard user requests for elevation. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | ACCESS CONTROL |
3.131 - User Account Control will automatically deny standard user requests for elevation. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | ACCESS CONTROL |
3.137 - User Account Control - Run all admins in Admin Approval Mode | DISA Windows Server 2008 DC STIG v6r47 | Windows | ACCESS CONTROL |
3.137 - User Account Control - Run all admins in Admin Approval Mode | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.137 - User Account Control - Run all admins in Admin Approval Mode. | DISA Windows 7 STIG v1r32 | Windows | ACCESS CONTROL |
5.116 - Passwords will not be saved in the Remote Desktop Client. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | IDENTIFICATION AND AUTHENTICATION |
APPL-13-004022 - The macOS system must require users to reauthenticate for privilege escalation when using the 'sudo' command - sudo command. | DISA STIG Apple macOS 13 v1r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
APPL-14-004060 - The macOS system must configure sudoers timestamp type. | DISA Apple macOS 14 (Sonoma) STIG v1r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
CASA-VN-000360 - The Cisco ASA VPN gateway must be configured to renegotiate the IKE security association after 24 hours or less. | DISA STIG Cisco ASA VPN v1r3 | Cisco | IDENTIFICATION AND AUTHENTICATION |
F5BI-AP-000191 - The BIG-IP APM must require users to re-authenticate when circumstances or situations require re-authentication. | DISA F5 BIG-IP Access Policy Manager 11.x STIG V1R1 | F5 | IDENTIFICATION AND AUTHENTICATION |
GEN001025 - The sudo command must require authentication - /etc/sudoers - !authenticate | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL |
GEN001025 - The sudo command must require authentication - /etc/sudoers - !authenticate | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/* - !authenticate | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL |
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/* - NOPASSWD | DISA STIG for Red Hat Enterprise Linux 5 v1r17 Audit | Unix | ACCESS CONTROL |
GEN001025 - The sudo command must require authentication - /etc/sudoers !authenticate | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL |
GEN001025 - The sudo command must require authentication - /etc/sudoers NOPASSWD | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL |
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/ NOPASSWD | DISA STIG for Oracle Linux 5 v1r14 | Unix | ACCESS CONTROL |
MYS8-00-010400 - The MySQL Database Server 8.0 must require users to reauthenticate when organization-defined circumstances or situations require reauthentication. | DISA Oracle MySQL 8.0 v1r5 DB | MySQLDB | IDENTIFICATION AND AUTHENTICATION |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation - sudoers | DISA Oracle Linux 7 STIG v2r5 | Unix | ACCESS CONTROL |
OL08-00-010381 - OL 8 must require users to reauthenticate for privilege escalation and changing roles. | DISA Oracle Linux 8 STIG v1r10 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL08-00-010385 - The OL 8 operating system must not be configured to bypass password requirements for privilege escalation. | DISA Oracle Linux 8 STIG v1r10 | Unix | IDENTIFICATION AND AUTHENTICATION |
PHTN-67-000065 - The Photon operating system must require users to reauthenticate for privilege escalation. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-07-010343 - The Red Hat Enterprise Linux operating system must require re-authentication when using the 'sudo' command. | DISA Red Hat Enterprise Linux 7 STIG v3r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-08-010380 - RHEL 8 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-08-010381 - RHEL 8 must require users to reauthenticate for privilege escalation. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-09-432025 - RHEL 9 must require users to reauthenticate for privilege escalation. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-09-432035 - RHEL 9 must restrict the use of the 'su' command. | DISA Red Hat Enterprise Linux 9 STIG v1r1 | Unix | |
RHEL-09-611085 - RHEL 9 must require users to provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010113 - The SUSE operating system must require re-authentication when using the 'sudo' command - sudo command. | DISA SLES 12 STIG v2r13 | Unix | IDENTIFICATION AND AUTHENTICATION |
SLES-12-010114 - The SUSE operating system must not be configured to bypass password requirements for privilege escalation. | DISA SLES 12 STIG v2r13 | Unix | IDENTIFICATION AND AUTHENTICATION |
SPLK-CL-000010 - Splunk Enterprise idle session timeout must be set to not exceed 15 minutes. | DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS | Unix | |
SYMP-AG-000310 - Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication - coreid | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | IDENTIFICATION AND AUTHENTICATION |
SYMP-AG-000310 - Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication - iwa | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | IDENTIFICATION AND AUTHENTICATION |
SYMP-AG-000310 - Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication - siteminder | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | IDENTIFICATION AND AUTHENTICATION |
SYMP-AG-000310 - Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication - xml | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | IDENTIFICATION AND AUTHENTICATION |
SYMP-AG-000310 - Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication. - coreid | DISA Symantec ProxySG Benchmark ALG v1r1 | BlueCoat | ACCESS CONTROL |
SYMP-AG-000310 - Symantec ProxySG providing user authentication intermediary services must require users to reauthenticate every 900 seconds when organization-defined circumstances or situations require reauthentication. - xml | DISA Symantec ProxySG Benchmark ALG v1r1 | BlueCoat | ACCESS CONTROL |
UBTU-20-010014 - The Ubuntu operating system must require users to reauthenticate for privilege escalation or when changing roles. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | IDENTIFICATION AND AUTHENTICATION |
UBTU-22-432010 - Ubuntu 22.04 LTS must require users to reauthenticate for privilege escalation or when changing roles. | DISA STIG Canonical Ubuntu 22.04 LTS v1r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
WN11-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in). | DISA Windows 11 STIG v1r6 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN11-CC-000270 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows 11 STIG v1r6 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN11-SO-000255 - User Account Control must automatically deny elevation requests for standard users. | DISA Windows 11 STIG v1r6 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN22-CC-000340 - Windows Server 2022 must not save passwords in the Remote Desktop Client. | DISA Windows Server 2022 STIG v1r5 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN22-SO-000380 - Windows Server 2022 User Account Control (UAC) approval mode for the built-in Administrator must be enabled. | DISA Windows Server 2022 STIG v1r5 | Windows | IDENTIFICATION AND AUTHENTICATION |