Item Search

NameAudit NamePluginCategory
4.1.3.14 Ensure events that modify user/group information are collected - groupCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify user/group information are collected - gshadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify user/group information are collected - opasswdCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify user/group information are collected - passwdCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify user/group information are collected - shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

F5BI-DM-000155 - The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are created.DISA F5 BIG-IP Device Management STIG v2r3F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

F5BI-DM-000161 - The BIG-IP appliance must be configured to generate alerts that can be forwarded to the administrators and Information System Security Officer (ISSO) when accounts are removed.DISA F5 BIG-IP Device Management STIG v2r3F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

F5BI-DM-000173 - The BIG-IP appliance must be configured to generate an immediate alert for account-enabling actions.DISA F5 BIG-IP Device Management STIG v2r3F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000039 - The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs - or administrators/roles appointed by the ISSM to select which auditable events are to be generated and forwarded to the syslog and/or local logs.DISA Juniper SRX Services Gateway NDM v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000060 - For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.DISA Juniper SRX Services Gateway NDM v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000061 - In the event that communications with the events server is lost, the Juniper SRX Services Gateway must continue to queue log records locally.DISA Juniper SRX Services Gateway NDM v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-DM-000097 - The Juniper SRX Services Gateway must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.DISA Juniper SRX Services Gateway NDM v3r2Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

PHTN-40-000107 The Photon operating system must audit the execution of privileged functions.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

PHTN-67-000040 - The Photon operating system must configure rsyslog to offload system logs to a central server.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-030870 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-030871 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-030872 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-030873 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

RHEL-07-030874 - The Red Hat Enterprise Linux operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020200 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020210 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020220 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020230 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-12-020590 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030010 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030020 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

SLES-15-030030 - The SUSE operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-18-010245 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-18-010246 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-18-010247 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-18-010248 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/security/opasswd.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-20-010100 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-20-010101 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-20-010102 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-20-010103 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-20-010104 - The Ubuntu operating system must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-22-654130 - Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/group.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-22-654135 - Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/gshadow.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-22-654140 - Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/opasswd.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-22-654145 - Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/passwd.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

UBTU-22-654150 - Ubuntu 22.04 LTS must generate audit records for all account creations, modifications, disabling, and termination events that affect /etc/shadow.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN12-AU-000031 - Windows Server 2012/2012 R2 must be configured to audit Logon/Logoff - Account Lockout failures.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN12-AU-000031 - Windows Server 2012/2012 R2 must be configured to audit Logon/Logoff - Account Lockout failures.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-AU-000120 - Windows Server 2016 must be configured to audit Account Management - Security Group Management successes.DISA Windows Server 2016 STIG v2r9Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN16-AU-000140 - Windows Server 2016 must be configured to audit Account Management - User Account Management successes.DISA Windows Server 2016 STIG v2r9Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN19-AU-000160 - Windows Server 2019 must be configured to audit Logon/Logoff - Account Lockout failures.DISA Windows Server 2019 STIG v3r2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000100 - Windows Server 2022 must be configured to audit Account Management - Security Group Management successes.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000110 - Windows Server 2022 must be configured to audit Account Management - User Account Management successes.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-AU-000120 - Windows Server 2022 must be configured to audit Account Management - User Account Management failures.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-DC-000230 - Windows Server 2022 must be configured to audit Account Management - Computer Account Management successes.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY