Item Search

NameAudit NamePluginCategory
CASA-ND-000920 - The Cisco ASA must be configured to allocate audit record storage capacity in accordance with organization-defined audit record storage requirements.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-000970 - The Cisco ASA must be configured to record time stamps for audit records that meet a granularity of one second for a minimum degree of precision.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-001220 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-VN-000170 - The Cisco ASA must be configured to use NIST FIPS-validated cryptography for Internet Key Exchange (IKE) Phase 1.DISA STIG Cisco ASA VPN v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-VN-000190 - The Cisco ASA must be configured to use a FIPS-validated cryptographic module to generate cryptographic hashes.DISA STIG Cisco ASA VPN v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-VN-000310 - The Cisco ASA VPN gateway must be configured to identify all peers before establishing a connection.DISA STIG Cisco ASA VPN v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-VN-000410 - The Cisco ASA remote access VPN server must be configured to identify and authenticate users before granting access to the network.DISA STIG Cisco ASA VPN v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-RT-000235 - The Cisco router must be configured to have Cisco Express Forwarding enabled.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000237 - The Cisco router must not be configured to use IPv6 Site Local Unicast addresses.DISA STIG Cisco IOS Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000391 - The Cisco perimeter switch must be configured to suppress Router Advertisements on all external IPv6-enabled interfaces.DISA STIG Cisco IOS Switch RTR v3r1Cisco

CONFIGURATION MANAGEMENT

DG0102-ORACLE11 - DBMS processes or services should run under custom, dedicated OS accounts - 'No Oracle services are running as LocalSystem'DISA STIG Oracle 11 Instance v9r1 OS WindowsWindows

ACCESS CONTROL

DG0102-ORACLE11 - DBMS processes or services should run under custom, dedicated OS accounts - 'Oracle Services are running under dedicated service accounts'DISA STIG Oracle 11 Instance v9r1 OS WindowsWindows

ACCESS CONTROL

DG0102-ORACLE11 - DBMS processes or services should run under custom, dedicated OS accounts - 'tns services are using correct service account'DISA STIG Oracle 11 Instance v9r1 OS UnixUnix

ACCESS CONTROL

DO6747-ORACLE11 - Remote administration should be disabled for the Oracle connection manager - '$ORACLE_HOME/network/admin/cman.ora REMOTE_ADMIN = no'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

ACCESS CONTROL

EX19-ED-000027 Exchange connectivity logging must be enabled.DISA Microsoft Exchange 2019 Edge Server STIG v2r1Windows

AUDIT AND ACCOUNTABILITY

EX19-ED-000095 Exchange internet-facing send connectors must specify a Smart Host.DISA Microsoft Exchange 2019 Edge Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000098 Exchange internal send connectors must use domain security (mutual authentication Transport Layer Security).DISA Microsoft Exchange 2019 Edge Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000232 Exchange internal Send connectors must use an authentication level.DISA Microsoft Exchange 2019 Edge Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000019 Exchange servers must use approved DOD certificates.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

ACCESS CONTROL

EX19-MB-000040 Exchange email subject line logging must be disabled.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

AUDIT AND ACCOUNTABILITY

EX19-MB-000053 Exchange must protect audit data against unauthorized access.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

AUDIT AND ACCOUNTABILITY

EX19-MB-000063 Exchange Send Fatal Errors to Microsoft must be disabled.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

CONFIGURATION MANAGEMENT

EX19-MB-000066 The Exchange Post Office Protocol 3 (POP3) service must be disabled.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

CONFIGURATION MANAGEMENT

EX19-MB-000233 Exchange internal send connectors must use an authentication level.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-MB-000244 Exchange must have the most current, approved Cumulative Update installed.DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1Windows

SYSTEM AND INFORMATION INTEGRITY

F5BI-DM-000291 - The F5 BIG-IP appliance providing user access control intermediary services must display the Standard Mandatory DOD-approved Notice and Consent Banner before granting access to SSH.DISA F5 BIG-IP Device Management STIG v2r3F5

ACCESS CONTROL

GEN000240 - The system clock must be synchronized to an authoritative DoD time source - 'xntpd|ntpd is running'DISA STIG AIX 5.3 v1r2Unix

AUDIT AND ACCOUNTABILITY

GEN000540 - Users must not be able to change passwords more than once every 24 hours.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN008020 - The LDAP TLS connection must require a certificate and this certificate has a valid path to a trusted CA - 'client Key Label'DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

HONW-09-000400 - The Honeywell Mobility Edge Android Pie device must be configured to lock the display after 15 minutes (or less) of inactivity - or less of inactivity.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

ACCESS CONTROL

HONW-09-002800 - The Honeywell Mobility Edge Android Pie device must be configured to disable developer modes.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-008700 - Honeywell Mobility Edge Android Pie devices users must complete required training.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-009000 - Honeywell Mobility Edge Android Pie devices must have the DoD root and intermediate PKI certificates installed.AirWatch - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-009000 - Honeywell Mobility Edge Android Pie devices must have the DoD root and intermediate PKI certificates installed.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-010200 - Honeywell Mobility Edge Android Pie devices must be configured to disallow configuration of date and time.AirWatch - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

HONW-09-010200 - Honeywell Mobility Edge Android Pie devices must be configured to disallow configuration of date and time.MobileIron - DISA Honeywell Android 9.x COPE v1r2MDM

CONFIGURATION MANAGEMENT

WBSP-AS-000320 - The WebSphere Application Server management interface must retain the Standard Mandatory DoD Notice and Consent BannerDISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000580 - The WebSphere Application Server must allocate JVM log record storage capacity in accordance with requirements - errDISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000590 - WebSphere Application Server must allocate audit log record storage capacity in accordance with requirements - maxFileSizeDISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000750 - The WebSphere Application Server must protect log information from unauthorized modification.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000780 - The WebSphere Application Server wsadmin file must be protected from unauthorized modification.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

AUDIT AND ACCOUNTABILITY

WBSP-AS-000790 - The WebSphere Application Server wsadmin file must be protected from unauthorized deletion.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

AUDIT AND ACCOUNTABILITY

WBSP-AS-000790 - The WebSphere Application Server wsadmin file must be protected from unauthorized deletion.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000790 - The WebSphere Application Server wsadmin file must be protected from unauthorized deletion.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

WBSP-AS-000910 - The WebSphere Application Server process must not be started from the command line with the -password option.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

CONFIGURATION MANAGEMENT

WBSP-AS-001390 - The WebSphere Application Servers must not be in the DMZ.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001590 - The WebSphere Application Server thread pool size must be defined to application load requirements - server.startupDISA IBM WebSphere Traditional 9 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001760 - The WebSphere Application Server must install security-relevant software updates within the time periodDISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

SYSTEM AND INFORMATION INTEGRITY

WG300 IIS6 - Web server system files must conform to minimum file permission requirements. - '\system32\inetsrv\oblt-log.logDISA STIG IIS 6.0 Server v6r16Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

WG300 IIS6 - Web server system files must conform to minimum file permission requirements. - '\system32\inetsrv\oblt-undone.lobDISA STIG IIS 6.0 Server v6r16Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT