Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CAT
I
CAT
CAT|I
Title
DISA Severity Level 1
Description
Any vulnerability, the exploitation of which will directly and immediately result in loss of Confidentiality, Availability, or Integrity.
Reference Item Details
Reference:
CAT - DISA Severity Level
Category:
Severity Level
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
1.006 - Users with Administrative privilege are not documented or do not have separate accounts for administrative duties.
Windows
DISA Windows Vista STIG v6r41
1.006-01 - Policy must require that administrative user accounts not be used with applications that access the internet.
Windows
DISA Windows Vista STIG v6r41
2.005 - Systems must be at supported service packs (SP) or releases levels.
Windows
DISA Windows Vista STIG v6r41
2.008 - Local volumes are not formatted using NTFS.
Windows
DISA Windows Vista STIG v6r41
2.022 - Disallow AutoPlay/Autorun from Autorun.inf
Windows
DISA Windows Vista STIG v6r41
2.023 - Standard user accounts must only have Read permissions to the Winlogon registry key.
Windows
DISA Windows Vista STIG v6r41
3.018 - Anonymous shares are not restricted. - RestrictAnonymous
Windows
DISA Windows Vista STIG v6r41
3.018 - Anonymous shares are not restricted. - RestrictAnonymousSAM
Windows
DISA Windows Vista STIG v6r41
3.030 - Anonymous access to the registry must be restricted.
Windows
DISA Windows Vista STIG v6r41
3.031 - The Send download LanMan compatible password option is not set to Send NTLMv2 response only\refuse LM.
Windows
DISA Windows Vista STIG v6r41
3.049 - The Recovery Console option is set to permit automatic logon to the system.
Windows
DISA Windows Vista STIG v6r41
3.059 - The system is configured to autoplay removable media.
Windows
DISA Windows Vista STIG v6r41
3.061 - Unencrypted remote access is permitted to system services.
Windows
DISA Windows Vista STIG v6r41
3.062 - Anonymous SID/Name translation is allowed.
Windows
DISA Windows Vista STIG v6r41
3.063 - Unauthorized named pipes are accessible with anonymous credentials.
Windows
DISA Windows Vista STIG v6r41
3.064 - Unauthorized registry paths are remotely accessible.
Windows
DISA Windows Vista STIG v6r41
3.065 - Unauthorized shares can be accessed anonymously.
Windows
DISA Windows Vista STIG v6r41
3.068 - Solicited Remote Assistance is allowed.
Windows
DISA Windows Vista STIG v6r41
3.073 - The system must be configured to prevent the storage of the LAN Manager hash of passwords.
Windows
DISA Windows Vista STIG v6r41
3.108 - Unauthorized registry paths and sub-paths are remotely accessible.
Windows
DISA Windows Vista STIG v6r41
3.116 - Named Pipes and Shares can be accessed anonymously.
Windows
DISA Windows Vista STIG v6r41
4.005 - Unapproved Users have access to Debug programs.
Windows
DISA Windows Vista STIG v6r41
4.009 - Unauthorized users are granted right to Act as part of the operating system.
Windows
DISA Windows Vista STIG v6r41
4.017 - DOD information system access does not require the use of a password.
Windows
DISA Windows Vista STIG v6r41
4.027 - Only administrators responsible for the system must have Administrator rights on the system.
Windows
DISA Windows Vista STIG v6r41
4.036 - The use of local accounts with blank passwords is not restricted to console logons only.
Windows
DISA Windows Vista STIG v6r41
5.005 - Installed FTP server is configured to allow access to the system drive.
Windows
DISA Windows Vista STIG v6r41
5.007 - An approved, up-to-date, DoD antivirus program must be installed and used.
Windows
DISA Windows Vista STIG v6r41
5.016 - Internet Information System (IIS) or its subcomponents are installed on a workstation.
Windows
DISA Windows Vista STIG v6r41
AADC-CL-001075 - Unsupported versions of Adobe Acrobat Pro DC Classic must be uninstalled.
Windows
DISA STIG Adobe Acrobat Pro DC Classic Track v2r1
AADC-CN-001075 - The Adobe Acrobat Pro DC Continuous latest security-related software updates must be installed.
Windows
DISA STIG Adobe Acrobat Pro DC Continuous Track v2r1
ADBP-XI-001075 - The Adobe Acrobat Pro XI latest security-related software updates must be installed.
Windows
DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2
ADBP-XI-005000 - An unsupported Adobe Acrobat Pro version must not be installed.
Windows
DISA STIG ADOBE ACROBAT PROFESSIONAL (PRO) XI v1r2
AIOS-01-080006 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
MDM
MobileIron - DISA Apple iOS 10 v1r3
AIOS-01-080006 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
MDM
AirWatch - DISA Apple iOS 10 v1r3
AIOS-02-080017 - Apple iOS must implement the management setting: Encrypt iTunes backups.
MDM
MobileIron - DISA Apple iOS 10 v1r3
AIOS-02-080017 - Apple iOS must implement the management setting: Encrypt iTunes backups.
MDM
AirWatch - DISA Apple iOS 10 v1r3
AIOS-02-090103 - Apple iOS device must have the latest available iOS operating system installed.
MDM
MobileIron - DISA Apple iOS 10 v1r3
AIOS-02-090103 - Apple iOS device must have the latest available iOS operating system installed.
MDM
AirWatch - DISA Apple iOS 10 v1r3
AIOS-12-010500 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
MDM
MobileIron - DISA Apple iOS 12 v2r1
AIOS-12-010500 - Apple iOS must require a valid password be successfully entered before the mobile device data is unencrypted.
MDM
AirWatch - DISA Apple iOS 12 v2r1
AIOS-12-011400 - Apple iOS device must have the latest available iOS operating system installed.
MDM
MobileIron - DISA Apple iOS 12 v2r1
AIOS-12-011400 - Apple iOS device must have the latest available iOS operating system installed.
MDM
AirWatch - DISA Apple iOS 12 v2r1
AIOS-12-999999 - All Apple iOS 12 installations must be removed.
MDM
MobileIron - DISA Apple iOS 12 v2r1
AIOS-12-999999 - All Apple iOS 12 installations must be removed.
MDM
AirWatch - DISA Apple iOS 12 v2r1
AIOS-13-010500 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted.
MDM
AirWatch - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-010500 - Apple iOS/iPadOS must require a valid password be successfully entered before the mobile device data is unencrypted.
MDM
MobileIron - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-011400 - iPhone and iPad must have the latest available iOS operating system installed.
MDM
MobileIron - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-011400 - iPhone and iPad must have the latest available iOS operating system installed.
MDM
AirWatch - DISA Apple iOS/iPadOS 13 v2r1
AIOS-13-999999 - All Apple iOS/iPadOS 13 installations must be removed.
MDM
AirWatch - DISA Apple iOS/iPadOS 13 v2r1