Item Search

NameAudit NamePluginCategory
AIX7-00-001046 - If LDAP authentication is required, AIX must setup LDAP client to refresh user and group caches less than a day.DISA STIG AIX 7.x v3r1Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-001135 - If SNMP service is enabled on AIX, the default SNMP password must not be used in the /etc/snmpd.conf config file.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002083 - The AIX /etc/group file must be owned by root.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002085 - All AIX interactive users home directories must be owned by their respective users.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002089 - Samba packages must be removed from AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002092 - The inetd.conf file on AIX must be group owned by the 'system' group.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002093 - The AIX /etc/inetd.conf file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002121 - The AIX SSH daemon must be configured to disable user .rhosts files.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002127 - AIX system must require authentication upon booting into single-user and maintenance modes.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003013 - AIX passwd.nntp file must have mode 0600 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003029 - AIX must enforce a delay of at least 4 seconds between login prompts following a failed login attempt.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003036 - The AIX global initialization files must contain the mesg -n or mesg n commands.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003045 - If there are no X11 clients that require CDE on AIX, the dt service must be disabled.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003048 - If SNMP is not required on AIX, the snmpd service must be disabled.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003055 - If AIX server is not functioning as a network router, the routed daemon must be disabled.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003065 - The cmsd daemon must be disabled on AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003085 - The instsrv daemon must be disabled on AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003104 - If DHCP server is not required on AIX, the DHCP server must be disabled.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003115 - AIX must contain no .forward files.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003122 - The SMTP service HELP command must not be enabled on AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003123 - NIS maps must be protected through hard-to-guess domain names on AIX.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003133 - AIX must not run any routing protocol daemons unless the system is a router.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-003139 - The .rhosts file must not be supported in AIX PAM.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

APPL-11-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-11-000022 - The macOS system must enforce the limit of three consecutive invalid logon attempts by a user before the user account is locked - maxFailedAttemptsDISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL

APPL-11-002068 - The macOS system must set permissions on user home directories to prevent users from having access to read or modify another user's files - User subdirectory Access Control ListsDISA STIG Apple macOS 11 v1r8Unix

CONFIGURATION MANAGEMENT

APPL-11-005050 - The macOS Application Firewall must be enabled - EnableStealthModeDISA STIG Apple macOS 11 v1r5Unix

CONFIGURATION MANAGEMENT

APPL-12-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 12 v1r9Unix

ACCESS CONTROL

APPL-12-000016 - The macOS system must be integrated into a directory services infrastructure.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-12-005053 - The macOS system must restrict the ability of individuals to write to external optical media.DISA STIG Apple macOS 12 v1r9Unix

CONFIGURATION MANAGEMENT

APPL-13-000016 - The macOS system must be integrated into a directory services infrastructure.DISA STIG Apple macOS 13 v1r4Unix

CONFIGURATION MANAGEMENT

APPL-13-002066 - The macOS system must not allow an unattended or automatic logon to the system.DISA STIG Apple macOS 13 v1r4Unix

CONFIGURATION MANAGEMENT

BIND-9X-001110 - The TSIG keys used with the BIND 9.x implementation must be owned by a privileged account.DISA BIND 9.x STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

DTOO246 - Scripts in One-Off Outlook forms must be disallowed.DISA STIG Microsoft Outlook 2013 v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO317 - Outlook - Replies or forwards to signed/encrypted messages must be signed/encrypted.DISA STIG Office 2010 Outlook v1r13Windows

CONFIGURATION MANAGEMENT

GEN008180 - If the system is using LDAP for authentication or account information, the TLS certificate authority file and/or directory (as appropriate) must have mode 0644 (0755 for directories) or less permissive - secmod.dbDISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

O121-BP-021300 - Oracle instance names must not contain Oracle version numbers.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-BP-022800 - Application role permissions must not be assigned to the Oracle PUBLIC role.DISA STIG Oracle 12c v3r2 DatabaseOracleDB

CONFIGURATION MANAGEMENT

SOL-11.1-020540 - .Xauthority or X*.hosts (or equivalent) file(s) must be used to restrict access to the X server.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-030030 - Generic Security Services (GSS) must be disabled.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040080 - The operating system must enforce password complexity requiring that at least one lowercase character is used.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040090 - The system must require passwords to contain at least one numeric character.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

SOL-11.1-040250 - The default umask for system and users must be 077.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040430 - Logins to the root account must be restricted to the system console only.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-040480 - The operating system must not allow logins for users with blank passwords.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050030 - The system must not respond to ICMP broadcast timestamp requests.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050070 - The system must ignore ICMP redirect messages.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-050110 - The system must set maximum number of half-open TCP connections to 4096.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-070170 - The system must not allow users to configure .forward files.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT