Item Search

NameAudit NamePluginCategory
APPNET0075 - Disable TLS RC4 cipher in .NetDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

APPNET0075 - Disable TLS RC4 cipher in .Net - Wow6432NodeDISA STIG for Microsoft Dot Net Framework 4.0 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AS24-W2-000780 - The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.DISA STIG Apache Server 2.4 Windows Site v1r3Windows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SSLDISA STIG IBM DB2 v10.5 LUW v1r4 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r4 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network ports and services deemed by the organization to be nonsecure - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r3 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network ports and services deemed by the organization to be nonsecure - SSL_SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r3 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network ports and services deemed by the organization to be nonsecure - SVCENAMEDISA STIG IBM DB2 v10.5 LUW v1r3 OS LinuxUnix

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network protocols, and services deemed by the organization to be nonsecure - SSLDISA STIG IBM DB2 v10.5 LUW v1r3 OS WindowsWindows

CONFIGURATION MANAGEMENT

DB2X-00-008300 - DB2 must disable network protocols, and services deemed by the organization to be nonsecure - SSLDISA STIG IBM DB2 v10.5 LUW v1r3 OS LinuxUnix

CONFIGURATION MANAGEMENT

DKER-EE-003560 - Docker Enterprise network ports on all running containers must be limited to what is needed.DISA STIG Docker Enterprise 2.x Linux/Unix v1r1Unix

CONFIGURATION MANAGEMENT

DTBC-0074 - Use of the QUIC protocol must be disabled.DISA STIG Google Chrome v2r4Windows
DTBC-0074 - Use of the QUIC protocol must be disabled.DISA STIG Google Chrome v2r8Windows
DTBC-0074 - Use of the QUIC protocol must be disabled.DISA STIG Google Chrome v2r6Windows
EX13-CA-000130 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v1r2Windows

CONFIGURATION MANAGEMENT

EX13-CA-000130 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Client Access Server STIG v1r3Windows

CONFIGURATION MANAGEMENT

EX13-EG-000305 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

CONFIGURATION MANAGEMENT

EX13-MB-000300 - Exchange services must be documented and unnecessary services must be removed or disabled.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

CONFIGURATION MANAGEMENT

IISW-SI-000239 - The IIS 8.5 websites must utilize ports, protocols, and services according to PPSM guidelines.DISA IIS 8.5 Site v1r9Windows

CONFIGURATION MANAGEMENT

MADB-10-008100 - MariaDB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA MariaDB Enterprise 10.x v1r2 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidanceDISA Oracle MySQL 8.0 v1r4 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - local socket/pipeDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - port settingsDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - portsDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - socketDISA Oracle MySQL 8.0 v1r3 DBMySQLDB
PPS9-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance - SSLEDB PostgreSQL Advanced Server OS Linux Audit v1r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-034200 - SQL Server must disable communication protocols not required for operation.DISA STIG SQL Server 2014 Instance OS Audit v1r10Windows
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r3Unix
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r1Unix
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r2Unix
VCFL-67-000028 - vSphere Client must be configured with the appropriate ports.DISA STIG VMware vSphere 6.7 Virgo Client v1r1Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r2Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r1Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r2Unix
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r1Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - localhost.httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r2Unix
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - localhost.httpsDISA STIG VMware vSphere 6.7 STS Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 UI Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpDISA STIG VMware vSphere 6.7 UI Tomcat v1r2Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 UI Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - httpsDISA STIG VMware vSphere 6.7 UI Tomcat v1r2Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - proxyDISA STIG VMware vSphere 6.7 UI Tomcat v1r1Unix
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - proxyDISA STIG VMware vSphere 6.7 UI Tomcat v1r2Unix