Item Search

NameAudit NamePluginCategory
GEN000000-AIX0100 - The /etc/netsvc.conf file must have mode 0644 or less permissive.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN000000-AIX0110 - The /etc/netsvc.conf file must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001360 - The NIS/NIS+/yp command files must have mode 0755 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001361 - NIS/NIS+/yp command files must not have extended ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001367 - The /etc/hosts file must be group-owned by root, bin, sys, or system.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001373 - The /etc/nsswitch.conf file must have mode 0644 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001394 - The /etc/group file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001540 - All files and directories contained in interactive user home directories must be owned by the home directory's owner.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001560 - All files and directories contained in user home directories must have mode 0750 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/init.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001580 - All run control scripts must have mode 0755 or less permissive - '/etc/rc.d/rc3.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001720 - All global initialization files must have mode 0644 or less permissive - '/etc/suid_profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/bashrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/csh.logout'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001730 - All global initialization files must not have extended ACLs - '/etc/suid_profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/csh.login'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/csh.logout'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001740 - All global initialization files must be owned by root - '/etc/profile.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001760 - All global initialization files must be group-owned by root, sys, bin, other, system or system default - '/etc/suid_profile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001760 - All global initialization files must be group-owned by root, sys, bin, other, system, or system default - '/etc/ksh.kshrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.login'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0740 or less permissive - '.logout'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN001880 - All local initialization files must have mode 0755 or less permissive - '.dtprofile'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - '~/.shosts'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - Group '.rhosts'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - User '.netrc'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002060 - All .rhosts, .shosts, .netrc, or hosts.equiv files must be accessible by only root or the owner - User '.rhosts'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002230 - All shell files must not have extended ACLs.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002280 - Device files and directories must only be writable by users with a system account or as configured by the vendor.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002360 - Audio devices must be group-owned by audio, root, sys, bin, or system - '/dev/audio*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN002520 - All public directories must be owned by root or an application account.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.daily/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003050 - Crontab files must be group-owned by root, cron, or the crontab creator's primary group - '/etc/cron.hourly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'daemon' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'games' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'mail' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'news' - cron.denyDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003060 - System accounts must not be listed in cron.allow or must be included in cron.deny - 'nobody' - cron.allowDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003090 - Crontab files must not have extended ACLs - '/etc/cron.daily'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003110 - Cron and crontab directories must not have extended ACLs - '/etc/cron.weekly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.d'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/cron.monthly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003120 - Cron and crontab directories must be owned by root or bin - '/etc/crontab'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003140 - Cron and crontab directories must be group-owned by root, sys, bin or cron - '/etc/cron.weekly'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003210 - The cron.deny file must not have an extended ACL.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN003220 - Cron programs must not set the umask to a value less restrictive than 077 - '/etc/cron.weekly/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

SHPT-00-000191 - SharePoint farm service account (Database Access account) must be configured with minimum privileges in Active Directory (AD).DISA STIG SharePoint 2010 v1r9Windows

ACCESS CONTROL

SHPT-00-000193 - The SharePoint setup user domain account must be configured with the minimum privileges in Active Directory.DISA STIG SharePoint 2010 v1r9Windows

ACCESS CONTROL

SHPT-00-000195 - The SharePoint setup user domain account must be configured with the minimum privileges for the local server.DISA STIG SharePoint 2010 v1r9Windows

ACCESS CONTROL