AIX7-00-002083 - The AIX /etc/group file must be owned by root. | DISA STIG AIX 7.x v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-002083 - The AIX /etc/group file must be owned by root. | DISA STIG AIX 7.x v2r3 | Unix | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-002084 - The AIX /etc/group file must be group-owned by security. | DISA STIG AIX 7.x v2r3 | Unix | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-002084 - The AIX /etc/group file must be group-owned by security. | DISA STIG AIX 7.x v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-002091 - The AIX /etc/group file must have mode 0644 or less permissive. | DISA STIG AIX 7.x v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
AIX7-00-002091 - The AIX /etc/group file must have mode 0644 or less permissive. | DISA STIG AIX 7.x v2r3 | Unix | IDENTIFICATION AND AUTHENTICATION |
GEN001470 - The /etc/passwd file must not contain password hashes. | DISA STIG for Oracle Linux 5 v2r1 | Unix | CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION |
OL6-00-000033 - The /etc/shadow file must be owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000034 - The /etc/shadow file must be group-owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000035 - The /etc/shadow file must have mode 0000. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000036 - The /etc/gshadow file must be owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000037 - The /etc/gshadow file must be group-owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000038 - The /etc/gshadow file must have mode 0000. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000039 - The /etc/passwd file must be owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000040 - The /etc/passwd file must be group-owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000041 - The /etc/passwd file must have mode 0644 or less permissive. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000042 - The /etc/group file must be owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000043 - The /etc/group file must be group-owned by root. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
OL6-00-000044 - The /etc/group file must have mode 0644 or less permissive. | DISA STIG Oracle Linux 6 v1r18 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000033 - The /etc/shadow file must be owned by root. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000034 - The /etc/shadow file must be group-owned by root. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000035 - The /etc/shadow file must have mode 0000. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000038 - The /etc/gshadow file must have mode 0000. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000039 - The /etc/passwd file must be owned by root. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000040 - The /etc/passwd file must be group-owned by root. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000041 - The /etc/passwd file must have mode 0644 or less permissive. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000042 - The /etc/group file must be owned by root. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000043 - The /etc/group file must be group-owned by root. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-06-000044 - The /etc/group file must have mode 0644 or less permissive. | DISA Red Hat Enterprise Linux 6 STIG v2r1 | Unix | IDENTIFICATION AND AUTHENTICATION |
SOL-11.1-040190 - The system must prevent the use of dictionary words for passwords - '/var/passwd' | DISA STIG Solaris 11 SPARC v2r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
SOL-11.1-040190 - The system must prevent the use of dictionary words for passwords - '/var/passwd' | DISA STIG Solaris 11 X86 v2r4 | Unix | IDENTIFICATION AND AUTHENTICATION |
SOL-11.1-040190 - The system must prevent the use of dictionary words for passwords - '/var/passwd' | DISA STIG Solaris 11 SPARC v2r2 | Unix | IDENTIFICATION AND AUTHENTICATION |
WN16-SO-000360 - Windows Server 2016 must be configured to prevent the storage of the LAN Manager hash of passwords. | DISA Windows Server 2016 STIG v2r2 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN16-SO-000360 - Windows Server 2016 must be configured to prevent the storage of the LAN Manager hash of passwords. | DISA Windows Server 2016 STIG v2r3 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN16-SO-000380 - The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM. | DISA Windows Server 2016 STIG v2r3 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN16-SO-000380 - The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM. | DISA Windows Server 2016 STIG v2r2 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN19-SO-000300 - Windows Server 2019 must be configured to prevent the storage of the LAN Manager hash of passwords. | DISA Windows Server 2019 STIG v2r3 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN19-SO-000300 - Windows Server 2019 must be configured to prevent the storage of the LAN Manager hash of passwords. | DISA Windows Server 2019 STIG v2r2 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN19-SO-000310 - Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM. | DISA Windows Server 2019 STIG v2r3 | Windows | IDENTIFICATION AND AUTHENTICATION |
WN19-SO-000310 - Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM. | DISA Windows Server 2019 STIG v2r2 | Windows | IDENTIFICATION AND AUTHENTICATION |