3.070 - The system will be configured to prevent the storage of passwords and credentials | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | IDENTIFICATION AND AUTHENTICATION |
3.129 - User Account Control approval mode for the built-in Administrator will be enabled. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | ACCESS CONTROL |
3.131 - User Account Control - Behavior of elevation prompt for standard users. | DISA Windows Server 2008 MS STIG v6r46 | Windows | ACCESS CONTROL |
3.137 - User Account Control - Run all admins in Admin Approval Mode | DISA Windows Server 2008 MS STIG v6r46 | Windows | ACCESS CONTROL |
3.137 - User Account Control will run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | ACCESS CONTROL |
5.224 - Password is required on resume from sleep (on battery). | DISA Windows 7 STIG v1r32 | Windows | CONFIGURATION MANAGEMENT |
5.224 - Power Mgmt - Password Wake on Battery (Only applicable to 2008 if installed on a laptop.) | DISA Windows Server 2008 DC STIG v6r47 | Windows | CONFIGURATION MANAGEMENT |
5.224 - Power Mgmt - Password Wake on Battery (Only applicable to 2008 if installed on a laptop.) | DISA Windows Server 2008 MS STIG v6r46 | Windows | CONFIGURATION MANAGEMENT |
5.225 - The user will be prompted for a password on resume from sleep (Plugged In). (Applicable on Server 2008 R2 if the system is configured to sleep.) | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | CONFIGURATION MANAGEMENT |
AIX7-00-002061 - AIX must remove NOPASSWD tag from sudo config files. | DISA STIG AIX 7.x v2r5 | Unix | |
AIX7-00-002061 - AIX must remove NOPASSWD tag from sudo config files. | DISA STIG AIX 7.x v2r8 | Unix | |
AIX7-00-002108 - If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication. | DISA STIG AIX 7.x v2r6 | Unix | |
AIX7-00-002108 - If GSSAPI authentication is not required on AIX, the SSH daemon must disable GSSAPI authentication. | DISA STIG AIX 7.x v2r8 | Unix | |
EP11-00-008800 - The EDB Postgres Advanced Server must require users to re-authenticate when organization-defined circumstances or situations require re-authentication. | EDB PostgreSQL Advanced Server v11 DB Audit v2r2 | PostgreSQLDB | |
GEN001025 - The sudo command must require authentication - /etc/sudoers.d/* - NOPASSWD | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000529 - The sudo command must require authentication - !authenticate | DISA STIG Oracle Linux 6 v2r6 | Unix | |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation - sudoers | DISA Oracle Linux 7 STIG v2r4 | Unix | ACCESS CONTROL |
OL07-00-010350 - The Oracle Linux operating system must be configured so users must re-authenticate for privilege escalation - sudoers.d | DISA Oracle Linux 7 STIG v2r4 | Unix | ACCESS CONTROL |
RHEL-07-010340 - The Red Hat Enterprise Linux operating system must be configured so that users must provide a password for privilege escalation. | DISA Red Hat Enterprise Linux 7 STIG v3r10 | Unix | |
RHEL-07-010350 - The Red Hat Enterprise Linux operating system must be configured so that users must re-authenticate for privilege escalation. | DISA Red Hat Enterprise Linux 7 STIG v3r10 | Unix | |
SLES-12-010110 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges - !authenticate | DISA SLES 12 STIG v2r6 | Unix | |
SLES-12-010110 - The SUSE operating system must reauthenticate users when changing authenticators, roles, or escalating privileges - NOPASSWD | DISA SLES 12 STIG v2r9 | Unix | |
SPLK-CL-000180 - Splunk Enterprise idle session timeout must be set to not exceed 15 minutes. | DISA STIG Splunk Enterprise 7.x for Windows v2r3 REST API | Splunk | |
WN08-SO-000083 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows 8/8.1 STIG v1r23 | Windows | ACCESS CONTROL |
WN10-CC-000145 - Users must be prompted for a password on resume from sleep (on battery). | DISA Windows 10 STIG v2r8 | Windows | |
WN10-CC-000145 - Users must be prompted for a password on resume from sleep (on battery). | DISA Windows 10 STIG v2r7 | Windows | |
WN10-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in). | DISA Windows 10 STIG v2r5 | Windows | |
WN10-CC-000150 - The user must be prompted for a password on resume from sleep (plugged in). | DISA Windows 10 STIG v2r8 | Windows | |
WN10-CC-000280 - Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows 10 STIG v2r7 | Windows | |
WN10-CC-000355 - The Windows Remote Management (WinRM) service must not store RunAs credentials. | DISA Windows 10 STIG v2r8 | Windows | |
WN10-CC-000355 - The Windows Remote Management (WinRM) service must not store RunAs credentials. | DISA Windows 10 STIG v2r5 | Windows | |
WN10-CC-000355 - The Windows Remote Management (WinRM) service must not store RunAs credentials. | DISA Windows 10 STIG v2r7 | Windows | |
WN10-SO-000245 - User Account Control approval mode for the built-in Administrator must be enabled. | DISA Windows 10 STIG v2r4 | Windows | |
WN10-SO-000255 - User Account Control must automatically deny elevation requests for standard users. | DISA Windows 10 STIG v2r8 | Windows | |
WN10-SO-000270 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows 10 STIG v2r4 | Windows | |
WN10-SO-000270 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows 10 STIG v2r7 | Windows | |
WN12-CC-000054 - Users must be prompted to authenticate on resume from sleep (on battery). | DISA Windows Server 2012 and 2012 R2 DC STIG v3r6 | Windows | |
WN12-CC-000054 - Users must be prompted to authenticate on resume from sleep (on battery). | DISA Windows Server 2012 and 2012 R2 MS STIG v3r4 | Windows | |
WN12-CC-000055 - The user must be prompted to authenticate on resume from sleep (plugged in). | DISA Windows Server 2012 and 2012 R2 DC STIG v3r5 | Windows | |
WN12-CC-000099 - Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r4 | Windows | |
WN12-CC-000099 - Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r6 | Windows | |
WN12-SO-000077 - User Account Control approval mode for the built-in Administrator must be enabled. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r5 | Windows | |
WN12-SO-000077 - User Account Control approval mode for the built-in Administrator must be enabled. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r6 | Windows | |
WN12-SO-000083 - User Account Control must run all administrators in Admin Approval Mode, enabling UAC. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r5 | Windows | |
WN16-CC-000370 - Passwords must not be saved in the Remote Desktop Client. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN16-CC-000390 - Remote Desktop Services must always prompt a client for passwords upon connection. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN16-SO-000460 - User Account Control approval mode for the built-in Administrator must be enabled. | DISA Windows Server 2016 STIG v2r7 | Windows | |
WN19-CC-000520 - Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials. | DISA Windows Server 2019 STIG v2r4 | Windows | |
WN19-SO-000380 - Windows Server 2019 User Account Control approval mode for the built-in Administrator must be enabled. | DISA Windows Server 2019 STIG v2r5 | Windows | |
WN19-SO-000410 - Windows Server 2019 User Account Control must automatically deny standard user requests for elevation. | DISA Windows Server 2019 STIG v2r4 | Windows | |