Item Search

NameAudit NamePluginCategory
3.123 - Auditing Access of Global System Objects must be turned off.DISA Windows Server 2008 MS STIG v6r46Windows

AUDIT AND ACCOUNTABILITY

3.123 - Auditing Access of Global System Objects must be turned off.DISA Windows Server 2008 DC STIG v6r47Windows

AUDIT AND ACCOUNTABILITY

3.123 - Auditing Access of Global System Objects must be turned off.DISA Windows 7 STIG v1r32Windows

AUDIT AND ACCOUNTABILITY

3.124 - Audit of Backup and Restore Privileges is not turned off.DISA Windows Server 2008 DC STIG v6r47Windows

AUDIT AND ACCOUNTABILITY

3.124 - Audit of Backup and Restore Privileges is not turned off.DISA Windows Server 2008 MS STIG v6r46Windows

AUDIT AND ACCOUNTABILITY

3.124 - Audit of backup and restore privileges is not turned off.DISA Windows 7 STIG v1r32Windows

AUDIT AND ACCOUNTABILITY

3.124 - Audit of Backup and Restore Privileges is not turned off.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.124 - Audit of Backup and Restore Privileges will be turned off.DISA Windows Server 2008 R2 DC STIG v1r34Windows

AUDIT AND ACCOUNTABILITY

3.124 - Audit of Backup and Restore Privileges will be turned off.DISA Windows Server 2008 R2 MS STIG v1r33Windows

AUDIT AND ACCOUNTABILITY

AMLS-L3-000270 - Arista MLS must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks.DISA STIG Arista MLS DCS-7000 Series RTR V1R2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Limit Impact of Denial of Service AttacksNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

BIND-9X-001054 - A BIND 9.x server implementation must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks - zone allow-queryDISA BIND 9.x STIG v1r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks.DISA STIG Cisco ASA FW v1r1Cisco
CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks.DISA STIG Cisco ASA FW v1r2Cisco
CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks.DISA STIG Cisco ASA FW v1r3Cisco
Catalina - Limit Impact of Denial of Service AttacksNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000760 - The Cisco PE switch must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile.DISA STIG Cisco IOS Switch RTR v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000100 - Exchange Outbound Connection Limit per Domain Count must be controlled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000105 - Exchange Global Outbound Message size must be controlled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000115 - Exchange Send connector connections count must be limited.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000120 - Exchange message size restrictions must be controlled on Send connectors.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

CONFIGURATION MANAGEMENT

EX13-EG-000135 - Exchange Receive connector Maximum Hop Count must be 60.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

CONFIGURATION MANAGEMENT

EX13-EG-000135 - Exchange Receive connector Maximum Hop Count must be 60.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000140 - Exchange Receive connectors must be clearly named.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

CONFIGURATION MANAGEMENT

EX13-EG-000140 - Exchange Receive connectors must be clearly named.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000145 - Exchange Receive connectors must control the number of recipients chunked on a single message.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000145 - Exchange Receive connectors must control the number of recipients chunked on a single message.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000155 - The Exchange Internet Receive connector connections count must be set to default.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000175 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000195 - Exchange Send connectors must be clearly named.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

CONFIGURATION MANAGEMENT

FNFG-FW-000075 - The FortiGate firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks.DISA Fortigate Firewall STIG v1r1FortiGate
JUNI-RT-000680 - The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have traffic storm control thresholds on CE-facing interfaces - routingDISA STIG Juniper Router RTR v1r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000750 - The Juniper P router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile - QoS policy in accordance with the QoS DODIN Technical Profile.DISA STIG Juniper Router RTR v1r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000006 - The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that signature-based objects are applied to outbound communications traffic.DISA Juniper SRX Services Gateway IDPS v1r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Limit Impact of Denial of Service AttacksNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-30-000036 - The Photon operating system must use Transmission Control Protocol (TCP) syncookies.DISA STIG VMware vSphere 7.0 Photon OS v1r2Unix
PHTN-67-000037 - The Photon operating system must use TCP syncookies.DISA STIG VMware vSphere 6.7 Photon OS v1r5Unix
PHTN-67-000037 - The Photon operating system must use TCP syncookies.DISA STIG VMware vSphere 6.7 Photon OS v1r3Unix
PHTN-67-000037 - The Photon operating system must use TCP syncookies.DISA STIG VMware vSphere 6.7 Photon OS v1r1Unix
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies.DISA SLES 15 STIG v1r11Unix
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies.DISA SLES 15 STIG v1r12Unix
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies.DISA SLES 15 STIG v1r10Unix
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies.DISA SLES 15 STIG v1r6Unix
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies.DISA SLES 15 STIG v1r9Unix
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies.DISA STIG Ubuntu 20.04 LTS v1r1Unix
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies.DISA STIG Ubuntu 20.04 LTS v1r9Unix
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies.DISA STIG Ubuntu 20.04 LTS v1r10Unix
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies.DISA STIG Ubuntu 20.04 LTS v1r4Unix
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies.DISA STIG Ubuntu 20.04 LTS v1r5Unix
VCSA-70-000110 - The vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC).DISA STIG VMware vSphere 7.0 vCenter v1r2VMware