3.123 - Auditing Access of Global System Objects must be turned off. | DISA Windows Server 2008 MS STIG v6r46 | Windows | AUDIT AND ACCOUNTABILITY |
3.123 - Auditing Access of Global System Objects must be turned off. | DISA Windows Server 2008 DC STIG v6r47 | Windows | AUDIT AND ACCOUNTABILITY |
3.123 - Auditing Access of Global System Objects must be turned off. | DISA Windows 7 STIG v1r32 | Windows | AUDIT AND ACCOUNTABILITY |
3.124 - Audit of Backup and Restore Privileges is not turned off. | DISA Windows Server 2008 DC STIG v6r47 | Windows | AUDIT AND ACCOUNTABILITY |
3.124 - Audit of Backup and Restore Privileges is not turned off. | DISA Windows Server 2008 MS STIG v6r46 | Windows | AUDIT AND ACCOUNTABILITY |
3.124 - Audit of backup and restore privileges is not turned off. | DISA Windows 7 STIG v1r32 | Windows | AUDIT AND ACCOUNTABILITY |
3.124 - Audit of Backup and Restore Privileges is not turned off. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
3.124 - Audit of Backup and Restore Privileges will be turned off. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | AUDIT AND ACCOUNTABILITY |
3.124 - Audit of Backup and Restore Privileges will be turned off. | DISA Windows Server 2008 R2 MS STIG v1r33 | Windows | AUDIT AND ACCOUNTABILITY |
AMLS-L3-000270 - Arista MLS must manage excess bandwidth to limit the effects of packet flooding types of denial of service (DoS) attacks. | DISA STIG Arista MLS DCS-7000 Series RTR V1R2 | Arista | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Limit Impact of Denial of Service Attacks | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
BIND-9X-001054 - A BIND 9.x server implementation must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks - zone allow-query | DISA BIND 9.x STIG v1r9 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks. | DISA STIG Cisco ASA FW v1r1 | Cisco | |
CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks. | DISA STIG Cisco ASA FW v1r2 | Cisco | |
CASA-FW-000150 - The Cisco ASA must be configured to enable threat detection to mitigate risks of denial-of-service (DoS) attacks. | DISA STIG Cisco ASA FW v1r3 | Cisco | |
Catalina - Limit Impact of Denial of Service Attacks | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-RT-000760 - The Cisco PE switch must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile. | DISA STIG Cisco IOS Switch RTR v1r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000100 - Exchange Outbound Connection Limit per Domain Count must be controlled. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000105 - Exchange Global Outbound Message size must be controlled. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000115 - Exchange Send connector connections count must be limited. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000120 - Exchange message size restrictions must be controlled on Send connectors. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | CONFIGURATION MANAGEMENT |
EX13-EG-000135 - Exchange Receive connector Maximum Hop Count must be 60. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | CONFIGURATION MANAGEMENT |
EX13-EG-000135 - Exchange Receive connector Maximum Hop Count must be 60. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000140 - Exchange Receive connectors must be clearly named. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | CONFIGURATION MANAGEMENT |
EX13-EG-000140 - Exchange Receive connectors must be clearly named. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000145 - Exchange Receive connectors must control the number of recipients chunked on a single message. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000145 - Exchange Receive connectors must control the number of recipients chunked on a single message. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000155 - The Exchange Internet Receive connector connections count must be set to default. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-MB-000175 - Exchange Message size restrictions must be controlled on Receive connectors. | DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-MB-000195 - Exchange Send connectors must be clearly named. | DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6 | Windows | CONFIGURATION MANAGEMENT |
FNFG-FW-000075 - The FortiGate firewall implementation must manage excess bandwidth to limit the effects of packet flooding types of denial-of-service (DoS) attacks. | DISA Fortigate Firewall STIG v1r1 | FortiGate | |
JUNI-RT-000680 - The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have traffic storm control thresholds on CE-facing interfaces - routing | DISA STIG Juniper Router RTR v1r4 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
JUNI-RT-000750 - The Juniper P router must be configured to enforce a Quality-of-Service (QoS) policy in accordance with the QoS GIG Technical Profile - QoS policy in accordance with the QoS DODIN Technical Profile. | DISA STIG Juniper Router RTR v1r4 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
JUSX-IP-000006 - The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that signature-based objects are applied to outbound communications traffic. | DISA Juniper SRX Services Gateway IDPS v1r2 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Limit Impact of Denial of Service Attacks | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-30-000036 - The Photon operating system must use Transmission Control Protocol (TCP) syncookies. | DISA STIG VMware vSphere 7.0 Photon OS v1r2 | Unix | |
PHTN-67-000037 - The Photon operating system must use TCP syncookies. | DISA STIG VMware vSphere 6.7 Photon OS v1r5 | Unix | |
PHTN-67-000037 - The Photon operating system must use TCP syncookies. | DISA STIG VMware vSphere 6.7 Photon OS v1r3 | Unix | |
PHTN-67-000037 - The Photon operating system must use TCP syncookies. | DISA STIG VMware vSphere 6.7 Photon OS v1r1 | Unix | |
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies. | DISA SLES 15 STIG v1r11 | Unix | |
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies. | DISA SLES 15 STIG v1r12 | Unix | |
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies. | DISA SLES 15 STIG v1r10 | Unix | |
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies. | DISA SLES 15 STIG v1r6 | Unix | |
SLES-15-010310 - The SUSE operating system must be configured to use TCP syncookies. | DISA SLES 15 STIG v1r9 | Unix | |
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies. | DISA STIG Ubuntu 20.04 LTS v1r1 | Unix | |
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies. | DISA STIG Ubuntu 20.04 LTS v1r9 | Unix | |
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies. | DISA STIG Ubuntu 20.04 LTS v1r10 | Unix | |
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies. | DISA STIG Ubuntu 20.04 LTS v1r4 | Unix | |
UBTU-20-010412 - The Ubuntu operating system must be configured to use TCP syncookies. | DISA STIG Ubuntu 20.04 LTS v1r5 | Unix | |
VCSA-70-000110 - The vCenter Server must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial-of-service (DoS) attacks by enabling Network I/O Control (NIOC). | DISA STIG VMware vSphere 7.0 vCenter v1r2 | VMware | |