Item Search

NameAudit NamePluginCategory
AS24-U2-000580 - The Apache web server document directory must be in a separate partition from the Apache web servers system files.DISA STIG Apache Server 2.4 Unix Site v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-U2-000580 - The Apache web server document directory must be in a separate partition from the Apache web servers system files.DISA STIG Apache Server 2.4 Unix Site v2r4 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W1-000580 - The Apache web server document directory must be in a separate partition from the Apache web servers system files.DISA STIG Apache Server 2.4 Windows Server v3r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI356-IE11 - The 64-bit tab processes, when running in Enhanced Protected Mode on 64-bit versions of Windows, must be turned on.DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI485-IE11 - Protected Mode must be enforced (Internet zone).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI612-IE11 - Internet Explorer Processes for Zone Elevation must be enforced (Explorer).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI614-IE11 - Internet Explorer Processes for Zone Elevation must be enforced (iexplore).DISA STIG IE 11 v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EP11-00-005800 - The EDB Postgres Advanced Server must isolate security functions from non-security functions.EDB PostgreSQL Advanced Server v11 DB Audit v2r4PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C2-004100 - Administrators must utilize a separate, distinct administrative account when performing administrative activities, accessing database security functions, or accessing security-relevant information.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C2-018500 - The DBMS must isolate security functions from non-security functions by means of separate security domains.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

O121-C2-004100 - Administrators must utilize a separate, distinct administrative account when performing administrative activities, accessing database security functions, or accessing security-relevant information.DISA STIG Oracle 12c v3r1 DatabaseOracleDB

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000281 - OHS must have the DocumentRoot directive set to a separate partition from the OHS system files.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000282 - OHS must have the Directory directive accompanying the DocumentRoot directive set to a separate partition from the OHS system files.DISA STIG Oracle HTTP Server 12.1.3 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PGS9-00-004000 - PostgreSQL must isolate security functions from non-security functions.DISA STIG PostgreSQL 9.x on RHEL OS v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PPS9-00-005800 - The EDB Postgres Advanced Server must isolate security functions from non-security functions.EDB PostgreSQL Advanced Server DB Audit v2r3PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-212035 - RHEL 9 must disable virtual system calls.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-212040 - RHEL 9 must clear the page allocator to prevent use-after-free attacks.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-212045 - RHEL 9 must clear SLUB/SLAB objects to prevent use-after-free attacks.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431010 - RHEL 9 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431025 - RHEL 9 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-021500 - SQL Server must isolate security functions from nonsecurity functions.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-001900 - SQL Server must isolate security functions from non-security functions.DISA STIG SQL Server 2016 Database Audit v3r1MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-65-000051 - The vCenter Server for Windows users must have the correct roles assigned.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000200 - Administrator accounts must not be enumerated during elevation.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000250 - User Account Control must, at minimum, prompt administrators for consent on the secure desktop.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000260 - User Account Control must be configured to detect application installations and prompt for elevation.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-SO-000265 - User Account Control must only elevate UIAccess applications that are installed in secure locations.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000005 - Domain users must be required to elevate when setting a networks location.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000005 - Domain users must be required to elevate when setting a networks location.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000077 - Administrator accounts must not be enumerated during elevation.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-CC-000077 - Administrator accounts must not be enumerated during elevation.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000081 - Windows must elevate all applications in User Account Control, not just signed ones.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000081 - Windows must elevate all applications in User Account Control, not just signed ones.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000082 - User Account Control must only elevate UIAccess applications that are installed in secure locations.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000082 - User Account Control must only elevate UIAccess applications that are installed in secure locations.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000084 - User Account Control must switch to the secure desktop when prompting for elevation.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000084 - User Account Control must switch to the secure desktop when prompting for elevation.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000085 - User Account Control must virtualize file and registry write failures to per-user locations.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000085 - User Account Control must virtualize file and registry write failures to per-user locations.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000086 - UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-MS-000020 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000480 - User Account Control must, at a minimum, prompt administrators for consent on the secure desktop.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000500 - User Account Control must be configured to detect application installations and prompt for elevation.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-SO-000530 - User Account Control must virtualize file and registry write failures to per-user locations.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000240 - Windows Server 2019 administrator accounts must not be enumerated during elevation.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-MS-000020 - Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000390 - Windows Server 2019 UIAccess applications must not be allowed to prompt for elevation without using the secure desktop.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000420 - Windows Server 2019 User Account Control must be configured to detect application installations and prompt for elevation.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000430 - Windows Server 2019 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000450 - Windows Server 2019 User Account Control (UAC) must virtualize file and registry write failures to per-user locations.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION