Item Search

NameAudit NamePluginCategory
ARST-ND-000690 - The Arista network devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.DISA STIG Arista MLS EOS 4.2x NDM v1r1Arista
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabledDISA STIG Cisco ASA NDM v1r1Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabledDISA STIG Cisco ASA NDM v1r3Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabledDISA STIG Cisco ASA NDM v1r5Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipherDISA STIG Cisco ASA NDM v1r1Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipherDISA STIG Cisco ASA NDM v1r3Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipherDISA STIG Cisco ASA NDM v1r5Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchangeDISA STIG Cisco ASA NDM v1r3Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchangeDISA STIG Cisco ASA NDM v1r5Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchangeDISA STIG Cisco ASA NDM v1r1Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh versionDISA STIG Cisco ASA NDM v1r1Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh versionDISA STIG Cisco ASA NDM v1r5Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh versionDISA STIG Cisco ASA NDM v1r3Cisco
CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ip ssh server algorithmDISA STIG Cisco IOS XE Switch NDM v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ip ssh version 2DISA STIG Cisco IOS XE Switch NDM v1r1Cisco
ESXI-06-200037 - Implement replay-resistant authentication mechanisms by using Active Directory for local user authentication.DISA STIG VMware vSphere 6.x ESXi v1r4VMware
ESXI-06-200038 - Implement replay-resistant authentication mechanisms by using the vSphere Authentication Proxy.DISA STIG VMware vSphere 6.x ESXi v1r4VMware
ESXI-06-200039 - Implement replay-resistant authentication mechanisms by restricting use of Active Directory ESX Admin group membership.DISA STIG VMware vSphere 6.x ESXi v1r4VMware

IDENTIFICATION AND AUTHENTICATION

FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-https-ssl-versions tlsv1-2 tlsv1-3DISA Fortigate Firewall NDM STIG v1r1FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-https-ssl-versions tlsv1-2 tlsv1-3DISA Fortigate Firewall NDM STIG v1r3FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-ssh-v1 disableDISA Fortigate Firewall NDM STIG v1r1FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-ssh-v1 disableDISA Fortigate Firewall NDM STIG v1r3FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - ssl-min-proto-version TLSv1-2DISA Fortigate Firewall NDM STIG v1r1FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - ssl-min-proto-version TLSv1-2DISA Fortigate Firewall NDM STIG v1r3FortiGate
JUEX-NM-000260 - The Juniper EX switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.DISA Juniper EX Series Network Device Management v1r4Juniper
RHEL-08-040060 - RHEL 8 must enforce SSHv2 for network access to all accounts. - installDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-040060 - RHEL 8 must enforce SSHv2 for network access to all accounts. - protocolDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
SHPT-00-000530 - The Central Administration Web Application must use Kerberos as the authentication provider.DISA STIG SharePoint 2010 v1r8Windows

IDENTIFICATION AND AUTHENTICATION

SHPT-00-000530 - The Central Administration Web Application must use Kerberos as the authentication provider.DISA STIG SharePoint 2010 v1r9Windows

IDENTIFICATION AND AUTHENTICATION

SHPT-00-000531 - SharePoint sites must not use NTLM.DISA STIG SharePoint 2010 v1r8Windows
SP13-00-000075 - SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.DISA STIG SharePoint 2013 v1r8Windows
SPLK-CL-000330 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG REST APISplunk
SPLK-CL-000330 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.DISA STIG Splunk Enterprise 8.x for Linux v1r4 STIG REST APISplunk
SYMP-NM-000230 - Symantec ProxySG must implement HTTPS-console to provide replay-resistant authentication mechanisms for network access to privileged accounts.- HTTP Console Not EnabledDISA Symantec ProxySG Benchmark NDM v1r1BlueCoat

CONFIGURATION MANAGEMENT

WBSP-AS-001090 - The WebSphere Application Server must provide security extensions to extend SOAP protocol and provide secure authenticationDISA IBM WebSphere Traditional 9 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2022 STIG v1r1Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2022 STIG v1r3Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2022 STIG v1r4Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Windows Server 2022 STIG v1r1Windows