SRG-OS-000480-GPOS-00227 Controls

STIG IDVersionTitleProduct
RHEL-08-010000V1R6RHEL 8 must be a vendor-supported release.
RHEL-08-010010V1R6RHEL 8 vendor packaged system security patches and updates must be installed and up to date.
RHEL-08-010292V1R6RHEL 8 must ensure the SSH server uses strong entropy.
RHEL-08-010460V1R6There must be no shosts.equiv files on the RHEL 8 operating system.
RHEL-08-010470V1R6There must be no .shosts files on the RHEL 8 operating system.
RHEL-08-010471V1R6RHEL 8 must enable the hardware random number generator entropy gatherer service.
RHEL-08-010480V1R6The RHEL 8 SSH public host key files must have mode 0644 or less permissive.
RHEL-08-010490V1R6The RHEL 8 SSH private host key files must have mode 0600 or less permissive.
RHEL-08-010500V1R6The RHEL 8 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-08-010510V1R6The RHEL 8 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL-08-010520V1R6The RHEL 8 SSH daemon must not allow authentication using known host’s authentication.
RHEL-08-010521V1R6The RHEL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
RHEL-08-010540V1R6RHEL 8 must use a separate file system for /var.
RHEL-08-010541V1R6RHEL 8 must use a separate file system for /var/log.
RHEL-08-010542V1R6RHEL 8 must use a separate file system for the system audit data path.
RHEL-08-010543V1R6A separate RHEL 8 filesystem must be used for the /tmp directory.
RHEL-08-010561V1R6The rsyslog service must be running in RHEL 8.
RHEL-08-010570V1R6RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
RHEL-08-010571V1R6RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
RHEL-08-010580V1R6RHEL 8 must prevent special devices on non-root local partitions.
RHEL-08-010590V1R6RHEL 8 must prevent code from being executed on file systems that contain user home directories.
RHEL-08-010600V1R6RHEL 8 must prevent special devices on file systems that are used with removable media.
RHEL-08-010610V1R6RHEL 8 must prevent code from being executed on file systems that are used with removable media.
RHEL-08-010620V1R6RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-08-010630V1R6RHEL 8 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-08-010640V1R6RHEL 8 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-08-010650V1R6RHEL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-08-010660V1R6Local RHEL 8 initialization files must not execute world-writable programs.
RHEL-08-010670V1R6RHEL 8 must disable kernel dumps unless needed.
RHEL-08-010671V1R6RHEL 8 must disable the kernel.core_pattern.
RHEL-08-010672V1R6RHEL 8 must disable acquiring, saving, and processing core dumps.
RHEL-08-010673V1R6RHEL 8 must disable core dumps for all users.
RHEL-08-010674V1R6RHEL 8 must disable storing core dumps.
RHEL-08-010675V1R6RHEL 8 must disable core dump backtraces.
RHEL-08-010680V1R6For RHEL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
RHEL-08-010690V1R6Executable search paths within the initialization files of all local interactive RHEL 8 users must only contain paths that resolve to the system default or the users home directory.
RHEL-08-010700V1R6All RHEL 8 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-08-010710V1R6All RHEL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
RHEL-08-010720V1R6All RHEL 8 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-08-010730V1R6All RHEL 8 local interactive user home directories must have mode 0750 or less permissive.
RHEL-08-010740V1R6All RHEL 8 local interactive user home directories must be group-owned by the home directory owner’s primary group.
RHEL-08-010750V1R6All RHEL 8 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-08-010760V1R6All RHEL 8 local interactive user accounts must be assigned a home directory upon creation.
RHEL-08-010770V1R6All RHEL 8 local initialization files must have mode 0740 or less permissive.
RHEL-08-010780V1R6All RHEL 8 local files and directories must have a valid owner.
RHEL-08-010790V1R6All RHEL 8 local files and directories must have a valid group owner.
RHEL-08-010800V1R6A separate RHEL 8 filesystem must be used for user home directories (such as /home or an equivalent).
RHEL-08-020320V1R6RHEL 8 must not have unnecessary accounts.
RHEL-08-020330V1R6RHEL 8 must not allow accounts configured with blank or null passwords.
RHEL-08-020340V1R6RHEL 8 must display the date and time of the last successful account logon upon logon.
RHEL-08-020350V1R6RHEL 8 must display the date and time of the last successful account logon upon an SSH logon.
RHEL-08-020353V1R6RHEL 8 must define default permissions for logon and non-logon shells.
RHEL-08-030010V1R6Cron logging must be implemented in RHEL 8.
RHEL-08-030061V1R6The RHEL 8 audit system must audit local events.
RHEL-08-030063V1R6RHEL 8 must resolve audit information before writing to disk.
RHEL-08-030670V1R6RHEL 8 must have the packages required for offloading audit logs installed.
RHEL-08-030680V1R6RHEL 8 must have the packages required for encrypting offloaded audit logs installed.
RHEL-08-040170V1R6The x86 Ctrl-Alt-Delete key sequence must be disabled on RHEL 8.
RHEL-08-040171V1R6The x86 Ctrl-Alt-Delete key sequence in RHEL 8 must be disabled if a graphical user interface is installed.
RHEL-08-040172V1R6The systemd Ctrl-Alt-Delete burst key sequence in RHEL 8 must be disabled.
RHEL-08-040180V1R6The debug-shell systemd service must be disabled on RHEL 8.
RHEL-08-040190V1R6The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for RHEL 8 operational support.
RHEL-08-040200V1R6The root account must be the only account having unrestricted access to the RHEL 8 system.
RHEL-08-040210V1R6RHEL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-08-040220V1R6RHEL 8 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-08-040230V1R6RHEL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-08-040240V1R6RHEL 8 must not forward IPv6 source-routed packets.
RHEL-08-040250V1R6RHEL 8 must not forward IPv6 source-routed packets by default.
RHEL-08-040260V1R6RHEL 8 must not enable IPv6 packet forwarding unless the system is a router.
RHEL-08-040261V1R6RHEL 8 must not accept router advertisements on all IPv6 interfaces.
RHEL-08-040262V1R6RHEL 8 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-08-040270V1R6RHEL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-08-040280V1R6RHEL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-08-040281V1R6RHEL 8 must disable access to network bpf syscall from unprivileged processes.
RHEL-08-040282V1R6RHEL 8 must restrict usage of ptrace to descendant processes.
RHEL-08-040283V1R6RHEL 8 must restrict exposed kernel pointer addresses access.
RHEL-08-040284V1R6RHEL 8 must disable the use of user namespaces.
RHEL-08-040285V1R6RHEL 8 must use reverse path filtering on all IPv4 interfaces.
RHEL-08-040290V1R6RHEL 8 must be configured to prevent unrestricted mail relaying.
RHEL-08-040300V1R6The RHEL 8 file integrity tool must be configured to verify extended attributes.
RHEL-08-040310V1R6The RHEL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
RHEL-08-040320V1R6The graphical display manager must not be installed on RHEL 8 unless approved.
RHEL-08-040330V1R6RHEL 8 network interfaces must not be in promiscuous mode.
RHEL-08-040340V1R6RHEL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
RHEL-08-040341V1R6The RHEL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-08-040350V1R6If the Trivial File Transfer Protocol (TFTP) server is required, the RHEL 8 TFTP daemon must be configured to operate in secure mode.
RHEL-08-040360V1R6A File Transfer Protocol (FTP) server package must not be installed unless mission essential on RHEL 8.
RHEL-08-040370V1R6The gssproxy package must not be installed unless mission essential on RHEL 8.
RHEL-08-040380V1R6The iprutils package must not be installed unless mission essential on RHEL 8.
RHEL-08-040390V1R6The tuned package must not be installed unless mission essential on RHEL 8.
RHEL-08-010382V1R6RHEL 8 must restrict privilege elevation to authorized personnel.
RHEL-08-010383V1R6RHEL 8 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-08-010472V1R6RHEL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
RHEL-08-010522V1R6The RHEL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
RHEL-08-010544V1R6RHEL 8 must use a separate file system for /var/tmp.
RHEL-08-010572V1R6RHEL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
RHEL-08-010731V1R6All RHEL 8 local interactive user home directory files must have mode 0750 or less permissive.
RHEL-08-010741V1R6RHEL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL-08-020032V1R6RHEL 8 must disable the user list at logon for graphical user interfaces.
RHEL-08-020331V1R6RHEL 8 must not allow blank or null passwords in the system-auth file.
RHEL-08-020332V1R6RHEL 8 must not allow blank or null passwords in the password-auth file.
RHEL-08-040209V1R6RHEL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-08-040239V1R6RHEL 8 must not forward IPv4 source-routed packets.
RHEL-08-040249V1R6RHEL 8 must not forward IPv4 source-routed packets by default.
RHEL-08-040279V1R6RHEL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-08-040286V1R6RHEL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
RHEL-08-040259V1R6RHEL 8 must not enable IPv4 packet forwarding unless the system is a router.
RHEL-08-010121V1R6The RHEL 8 operating system must not have accounts configured with blank or null passwords.
RHEL-08-010379V1R6RHEL 8 must specify the default "include" directory for the /etc/sudoers file.
RHEL-08-020101V1R6RHEL 8 must ensure the password complexity module is enabled in the system-auth file.
RHEL-08-020102V1R6RHEL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
RHEL-08-020103V1R6RHEL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
RHEL-08-020104V1R6RHEL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
RHEL-08-040321V1R6The graphical display manager must not be the default target on RHEL 8 unless approved.
SLES-15-010000V1R4The SUSE operating system must be a vendor-supported release.
SLES-15-010010V1R4Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
SLES-15-020080V1R4The SUSE operating system must display the date and time of the last successful account logon upon logon.
SLES-15-020090V1R4The SUSE operating system must not have unnecessary accounts.
SLES-15-020091V1R4The SUSE operating system must not have unnecessary account capabilities.
SLES-15-020100V1R4The SUSE operating system root account must be the only account with unrestricted access to the system.
SLES-15-020101V1R4The SUSE operating system must restrict privilege elevation to authorized personnel.
SLES-15-020103V1R4The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
SLES-15-020110V1R4All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
SLES-15-020120V1R4The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
SLES-15-020300V1R4The SUSE operating system must not be configured to allow blank or null passwords.
SLES-15-030810V1R4The SUSE operating system must use a separate file system for the system audit data path.
SLES-15-030820V1R4The SUSE operating system must not disable syscall auditing.
SLES-15-040020V1R4There must be no .shosts files on the SUSE operating system.
SLES-15-040030V1R4There must be no shosts.equiv files on the SUSE operating system.
SLES-15-040040V1R4The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
SLES-15-040050V1R4The SUSE operating system file integrity tool must be configured to verify extended attributes.
SLES-15-040060V1R4The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
SLES-15-040061V1R4The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
SLES-15-040062V1R4The SUSE operating system must disable the systemd Ctrl-Alt-Delete burst key sequence.
SLES-15-040070V1R4All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
SLES-15-040080V1R4All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
SLES-15-040090V1R4All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
SLES-15-040100V1R4All SUSE operating system local interactive user home directories must be group-owned by the home directory owner's primary group.
SLES-15-040110V1R4All SUSE operating system local initialization files must have mode 0740 or less permissive.
SLES-15-040120V1R4All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
SLES-15-040130V1R4All SUSE operating system local initialization files must not execute world-writable programs.
SLES-15-040140V1R4SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040150V1R4SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040160V1R4SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-15-040170V1R4SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLES-15-040180V1R4All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SLES-15-040190V1R4SUSE operating system kernel core dumps must be disabled unless needed.
SLES-15-040200V1R4A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
SLES-15-040210V1R4The SUSE operating system must use a separate file system for /var.
SLES-15-040220V1R4The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLES-15-040230V1R4The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
SLES-15-040240V1R4The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
SLES-15-040250V1R4The SUSE operating system SSH daemon private host key files must have mode 0600 or less permissive.
SLES-15-040260V1R4The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
SLES-15-040280V1R4The SUSE operating system SSH daemon must not allow compression or must only allow compression after successful authentication.
SLES-15-040290V1R4The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLES-15-040300V1R4The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLES-15-040310V1R4The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLES-15-040320V1R4The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLES-15-040321V1R4The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLES-15-040330V1R4The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-15-040340V1R4The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040341V1R4The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-15-040350V1R4The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040360V1R4The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-15-040370V1R4The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLES-15-040380V1R4The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLES-15-040381V1R4The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLES-15-040382V1R4The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLES-15-040390V1R4The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
SLES-15-040400V1R4All SUSE operating system files and directories must have a valid owner.
SLES-15-040410V1R4All SUSE operating system files and directories must have a valid group owner.
WN19-00-000010V3R1Windows Server 2019 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN19-00-000030V3R1Windows Server 2019 administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN19-00-000040V3R1Windows Server 2019 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN19-00-000060V3R1Windows Server 2019 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN19-00-000090V3R1Windows Server 2019 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN19-00-000100V3R1Windows Server 2019 must be maintained at a supported servicing level.
WN19-00-000110V3R1Windows Server 2019 must use an anti-virus program.
WN19-00-000120V3R1Windows Server 2019 must have a host-based intrusion detection or prevention system.
WN19-00-000240V3R1Windows Server 2019 must have software certificate installation files removed.
WN19-00-000420V3R1Windows Server 2019 FTP servers must be configured to prevent anonymous logons.
WN19-00-000430V3R1Windows Server 2019 FTP servers must be configured to prevent access to the system drive.
WN19-00-000450V3R1Windows Server 2019 must have orphaned security identifiers (SIDs) removed from user rights.
WN19-00-000460V3R1Windows Server 2019 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN19-00-000470V3R1Windows Server 2019 must have Secure Boot enabled.
WN19-CC-000030V3R1Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN19-CC-000040V3R1Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN19-CC-000050V3R1Windows Server 2019 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN19-CC-000070V3R1Windows Server 2019 insecure logons to an SMB server must be disabled.
WN19-CC-000080V3R1Windows Server 2019 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN19-CC-000100V3R1Windows Server 2019 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN19-CC-000110V3R1Windows Server 2019 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN19-CC-000130V3R1Windows Server 2019 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN19-CC-000140V3R1Windows Server 2019 group policy objects must be reprocessed even if they have not changed.
WN19-CC-000180V3R1Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (on battery).
WN19-CC-000190V3R1Windows Server 2019 users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN19-CC-000250V3R1Windows Server 2019 Telemetry must be configured to Security or Basic.
WN19-CC-000260V3R1Windows Server 2019 Windows Update must not obtain updates from other PCs on the Internet.
WN19-CC-000320V3R1Windows Server 2019 Turning off File Explorer heap termination on corruption must be disabled.
WN19-CC-000330V3R1Windows Server 2019 File Explorer shell protocol must run in protected mode.
WN19-CC-000390V3R1Windows Server 2019 must prevent attachments from being downloaded from RSS feeds.
WN19-CC-000440V3R1Windows Server 2019 users must be notified if a web-based program attempts to install software.
WN19-DC-000150V3R1Windows Server 2019 directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
WN19-DC-000330V3R1Windows Server 2019 domain controllers must be configured to allow reset of machine account passwords.
WN19-DC-000430V3R1The password for the krbtgt account on a domain must be reset at least every 180 days.
WN19-MS-000050V3R1Windows Server 2019 must limit the caching of logon credentials to four or less on domain-joined member servers.
WN19-MS-000140V3R1Windows Server 2019 must be running Credential Guard on domain-joined member servers.
WN19-SO-000020V3R1Windows Server 2019 must prevent local accounts with blank passwords from being used from the network.
WN19-SO-000030V3R1Windows Server 2019 built-in administrator account must be renamed.
WN19-SO-000040V3R1Windows Server 2019 built-in guest account must be renamed.
WN19-SO-000100V3R1Windows Server 2019 maximum age for machine account passwords must be configured to 30 days or less.
WN19-SO-000150V3R1Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN19-SO-000210V3R1Windows Server 2019 must not allow anonymous SID/Name translation.
WN19-SO-000220V3R1Windows Server 2019 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
WN19-SO-000240V3R1Windows Server 2019 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN19-SO-000260V3R1Windows Server 2019 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN19-SO-000270V3R1Windows Server 2019 must prevent NTLM from falling back to a Null session.
WN19-SO-000280V3R1Windows Server 2019 must prevent PKU2U authentication using online identities.
WN19-SO-000310V3R1Windows Server 2019 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
WN19-SO-000320V3R1Windows Server 2019 must be configured to at least negotiate signing for LDAP client signing.
WN19-SO-000330V3R1Windows Server 2019 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN19-SO-000340V3R1Windows Server 2019 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN19-SO-000370V3R1Windows Server 2019 default permissions of global system objects must be strengthened.
WN19-UC-000010V3R1Windows Server 2019 must preserve zone information when saving attachments.
WN19-00-000280V3R1Windows Server 2019 must have a host-based firewall installed and enabled.
UBTU-18-010032V2R12The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
UBTU-18-010150V2R12The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-18-010151V2R12The Ubuntu Operating system must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-18-010418V2R12The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-18-010419V2R12The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-18-010450V2R12All local interactive user home directories defined in the /etc/passwd file must exist.
UBTU-18-010451V2R12All local interactive user home directories must have mode 0750 or less permissive.
UBTU-18-010452V2R12All local interactive user home directories must be group-owned by the home directory owners primary group.
UBTU-18-010522V2R12The Ubuntu operating system must not have accounts configured with blank or null passwords.
UBTU-18-010523V2R12The Ubuntu operating system must not allow accounts configured with blank or null passwords.
UBTU-20-010048V1R6The Ubuntu operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-20-010049V1R6The Ubuntu operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-20-010453V1R6The Ubuntu operating system must display the date and time of the last successful account logon upon logon.
UBTU-20-010459V1R6The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-20-010460V1R6The Ubuntu operating system must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-20-010462V1R6The Ubuntu operating system must not have accounts configured with blank or null passwords.
UBTU-20-010463V1R6The Ubuntu operating system must not allow accounts configured with blank or null passwords.
APPL-14-000016V1R1The macOS system must be integrated into a directory services infrastructure.
APPL-14-003013V1R1The macOS system must enable firmware password.
APPL-14-005110V1R1The macOS system must enforce enrollment in mobile device management.
APPL-14-005120V1R1The macOS system must enable recovery lock.
APPL-14-005130V1R1The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically.
APPL-13-000016V1R5The macOS system must be integrated into a directory services infrastructure.
APPL-13-000032V1R5The macOS system must be configured with dedicated user accounts to decrypt the hard disk upon startup.
APPL-13-000033V1R5The macOS system must be configured to disable password forwarding for FileVault.
APPL-13-002050V1R5The macOS system must disable the Screen Sharing feature.
APPL-13-002060V1R5The macOS system must only allow applications with a valid digital signature to run.
APPL-13-002070V1R5The macOS system must use an approved antivirus program.
APPL-13-003012V1R5The macOS system must be configured to prevent displaying password hints.
APPL-13-003013V1R5The macOS system must be configured with a firmware password to prevent access to single user mode and booting from alternative media.
APPL-13-003050V1R5The macOS system must be configured so that the login command requires smart card authentication.
APPL-13-003051V1R5The macOS system must be configured so that the su command requires smart card authentication.
APPL-13-003052V1R5The macOS system must be configured so that the sudo command requires smart card authentication.
APPL-13-005051V1R5The macOS system must restrict the ability of individuals to use USB storage devices.
APPL-13-005053V1R5The macOS system must restrict the ability of individuals to write to external optical media.
OL07-00-010020V3R1The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
OL07-00-010290V3R1The Oracle Linux operating system must not allow accounts configured with blank or null passwords.
OL07-00-020230V3R1The Oracle Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
OL07-00-020250V3R1The Oracle Linux operating system must be a vendor supported release.
OL07-00-020260V3R1The Oracle Linux operating system security patches and updates must be installed and up to date.
OL07-00-020270V3R1The Oracle Linux operating system must not have unnecessary accounts.
OL07-00-020310V3R1The Oracle Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
OL07-00-020320V3R1The Oracle Linux operating system must be configured so that all files and directories have a valid owner.
OL07-00-020330V3R1The Oracle Linux operating system must be configured so that all files and directories have a valid group owner.
OL07-00-020610V3R1The Oracle Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
OL07-00-020620V3R1The Oracle Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
OL07-00-020630V3R1The Oracle Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
OL07-00-020640V3R1The Oracle Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
OL07-00-020650V3R1The Oracle Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
OL07-00-020660V3R1The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
OL07-00-020670V3R1The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
OL07-00-020680V3R1The Oracle Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
OL07-00-020690V3R1The Oracle Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
OL07-00-020700V3R1The Oracle Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
OL07-00-020710V3R1The Oracle Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
OL07-00-020720V3R1The Oracle Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
OL07-00-020730V3R1The Oracle Linux operating system must be configured so that local initialization files do not execute world-writable programs.
OL07-00-020900V3R1The Oracle Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
OL07-00-021000V3R1The Oracle Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
OL07-00-021010V3R1The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL07-00-021020V3R1The Oracle Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
OL07-00-021021V3R1The Oracle Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
OL07-00-021030V3R1The Oracle Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
OL07-00-021040V3R1The Oracle Linux operating system must set the umask value to 077 for all local interactive user accounts.
OL07-00-021100V3R1The Oracle Linux operating system must have cron logging implemented.
OL07-00-021110V3R1The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
OL07-00-021120V3R1The Oracle Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
OL07-00-021300V3R1The Oracle Linux operating system must disable Kernel core dumps unless needed.
OL07-00-021310V3R1The Oracle Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
OL07-00-021320V3R1The Oracle Linux operating system must use a separate file system for /var.
OL07-00-021340V3R1The Oracle Linux operating system must use a separate file system for /tmp (or equivalent).
OL07-00-021600V3R1The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
OL07-00-021610V3R1The Oracle Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
OL07-00-021620V3R1The Oracle Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
OL07-00-031000V3R1The Oracle Linux operating system must send rsyslog output to a log aggregation server.
OL07-00-031010V3R1The Oracle Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
OL07-00-032000V3R1The Oracle Linux operating system must use a virus scan program.
OL07-00-040330V3R1The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
OL07-00-040350V3R1The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
OL07-00-040360V3R1The Oracle Linux operating system must display the date and time of the last successful account logon upon an SSH logon.
OL07-00-040370V3R1The Oracle Linux operating system must not permit direct logons to the root account using remote access via SSH.
OL07-00-040380V3R1The Oracle Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
OL07-00-040410V3R1The Oracle Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
OL07-00-040420V3R1The Oracle Linux operating system must be configured so the SSH private host key files have mode 0640 or less permissive.
OL07-00-040450V3R1The Oracle Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
OL07-00-040460V3R1The Oracle Linux operating system must be configured so that the SSH daemon uses privilege separation.
OL07-00-040470V3R1The Oracle Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
OL07-00-040520V3R1The Oracle Linux operating system must enable an application firewall, if available.
OL07-00-040530V3R1The Oracle Linux operating system must display the date and time of the last successful account logon upon logon.
OL07-00-040540V3R1The Oracle Linux operating system must not contain .shosts files.
OL07-00-040550V3R1The Oracle Linux operating system must not contain shosts.equiv files.
OL07-00-040600V3R1For Oracle Linux operating systems using DNS resolution, at least two name servers must be configured.
OL07-00-040610V3R1The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
OL07-00-040611V3R1The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
OL07-00-040612V3R1The Oracle Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
OL07-00-040620V3R1The Oracle Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
OL07-00-040630V3R1The Oracle Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL07-00-040640V3R1The Oracle Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL07-00-040641V3R1The Oracle Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
OL07-00-040650V3R1The Oracle Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
OL07-00-040660V3R1The Oracle Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
OL07-00-040670V3R1Network interfaces configured on The Oracle Linux operating system must not be in promiscuous mode.
OL07-00-040680V3R1The Oracle Linux operating system must be configured to prevent unrestricted mail relaying.
OL07-00-040690V3R1The Oracle Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
OL07-00-040700V3R1The Oracle Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
OL07-00-040710V3R1The Oracle Linux operating system must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
OL07-00-040720V3R1The Oracle Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
OL07-00-040730V3R1The Oracle Linux operating system must not have a graphical display manager installed unless approved.
OL07-00-040740V3R1The Oracle Linux operating system must not be performing packet forwarding unless the system is a router.
OL07-00-040750V3R1The Oracle Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
OL07-00-040800V3R1SNMP community strings on the Oracle Linux operating system must be changed from the default.
OL07-00-040810V3R1The Oracle Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
OL07-00-040820V3R1The Oracle Linux operating system must not have unauthorized IP tunnels configured.
OL07-00-040830V3R1The Oracle Linux operating system must not forward IPv6 source-routed packets.
OL07-00-020231V3R1The Oracle Linux operating system must be configured so the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
OL07-00-021031V3R1The Oracle Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
OL07-00-040711V3R1The Oracle Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
OL07-00-010341V3R1The Oracle Linux operating system must restrict privilege elevation to authorized personnel.
OL07-00-010342V3R1The Oracle Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
OL07-00-010291V3R1The Oracle Linux operating system must not have accounts configured with blank or null passwords.
OL07-00-010339V3R1The Oracle Linux operating system must specify the default "include" directory for the /etc/sudoers file.
OL07-00-010063V3R1The Oracle Linux operating system must disable the login screen user list for graphical user interfaces.
RHEL-07-010290V3R6The Red Hat Enterprise Linux operating system must not allow accounts configured with blank or null passwords.
RHEL-07-020230V3R6The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled on the command line.
RHEL-07-020231V3R6The Red Hat Enterprise Linux operating system must be configured so that the x86 Ctrl-Alt-Delete key sequence is disabled in the Graphical User Interface.
RHEL-07-020250V3R6The Red Hat Enterprise Linux operating system must be a vendor supported release.
RHEL-07-020260V3R6The Red Hat Enterprise Linux operating system security patches and updates must be installed and up to date.
RHEL-07-020270V3R6The Red Hat Enterprise Linux operating system must not have unnecessary accounts.
RHEL-07-020310V3R6The Red Hat Enterprise Linux operating system must be configured so that the root account must be the only account having unrestricted access to the system.
RHEL-07-020320V3R6The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid owner.
RHEL-07-020330V3R6The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid group owner.
RHEL-07-020610V3R6The Red Hat Enterprise Linux operating system must be configured so that all local interactive user accounts, upon creation, are assigned a home directory.
RHEL-07-020620V3R6The Red Hat Enterprise Linux operating system must be configured so that all local interactive users have a home directory assigned and defined in the /etc/passwd file.
RHEL-07-020630V3R6The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories have mode 0750 or less permissive.
RHEL-07-020640V3R6The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are owned by their respective users.
RHEL-07-020650V3R6The Red Hat Enterprise Linux operating system must be configured so that all local interactive user home directories are group-owned by the home directory owners primary group.
RHEL-07-020660V3R6The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a valid owner.
RHEL-07-020670V3R6The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
RHEL-07-020680V3R6The Red Hat Enterprise Linux operating system must be configured so that all files and directories contained in local interactive user home directories have a mode of 0750 or less permissive.
RHEL-07-020690V3R6The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for interactive users are owned by the home directory user or root.
RHEL-07-020700V3R6The Red Hat Enterprise Linux operating system must be configured so that all local initialization files for local interactive users are be group-owned by the users primary group or root.
RHEL-07-020710V3R6The Red Hat Enterprise Linux operating system must be configured so that all local initialization files have mode 0740 or less permissive.
RHEL-07-020720V3R6The Red Hat Enterprise Linux operating system must be configured so that all local interactive user initialization files executable search paths contain only paths that resolve to the users home directory.
RHEL-07-020730V3R6The Red Hat Enterprise Linux operating system must be configured so that local initialization files do not execute world-writable programs.
RHEL-07-020900V3R6The Red Hat Enterprise Linux operating system must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-07-021000V3R6The Red Hat Enterprise Linux operating system must be configured so that file systems containing user home directories are mounted to prevent files with the setuid and setgid bit set from being executed.
RHEL-07-021010V3R6The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-07-021020V3R6The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).
RHEL-07-021021V3R6The Red Hat Enterprise Linux operating system must prevent binary files from being executed on file systems that are being imported via Network File System (NFS).
RHEL-07-021030V3R6The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are group-owned by root, sys, bin, or an application group.
RHEL-07-021040V3R6The Red Hat Enterprise Linux operating system must set the umask value to 077 for all local interactive user accounts.
RHEL-07-021100V3R6The Red Hat Enterprise Linux operating system must have cron logging implemented.
RHEL-07-021110V3R6The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is owned by root.
RHEL-07-021120V3R6The Red Hat Enterprise Linux operating system must be configured so that the cron.allow file, if it exists, is group-owned by root.
RHEL-07-021300V3R6The Red Hat Enterprise Linux operating system must disable Kernel core dumps unless needed.
RHEL-07-021310V3R6The Red Hat Enterprise Linux operating system must be configured so that a separate file system is used for user home directories (such as /home or an equivalent).
RHEL-07-021320V3R6The Red Hat Enterprise Linux operating system must use a separate file system for /var.
RHEL-07-021330V3R6The Red Hat Enterprise Linux operating system must use a separate file system for the system audit data path.
RHEL-07-021340V3R6The Red Hat Enterprise Linux operating system must use a separate file system for /tmp (or equivalent).
RHEL-07-021600V3R6The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify Access Control Lists (ACLs).
RHEL-07-021610V3R6The Red Hat Enterprise Linux operating system must be configured so that the file integrity tool is configured to verify extended attributes.
RHEL-07-021620V3R6The Red Hat Enterprise Linux operating system must use a file integrity tool that is configured to use FIPS 140-2 approved cryptographic hashes for validating file contents and directories.
RHEL-07-031000V3R6The Red Hat Enterprise Linux operating system must send rsyslog output to a log aggregation server.
RHEL-07-031010V3R6The Red Hat Enterprise Linux operating system must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-07-040201V3R6The Red Hat Enterprise Linux operating system must implement virtual address space randomization.
RHEL-07-040330V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using RSA rhosts authentication.
RHEL-07-040350V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using rhosts authentication.
RHEL-07-040360V3R6The Red Hat Enterprise Linux operating system must display the date and time of the last successful account logon upon an SSH logon.
RHEL-07-040370V3R6The Red Hat Enterprise Linux operating system must not permit direct logons to the root account using remote access via SSH.
RHEL-07-040380V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow authentication using known hosts authentication.
RHEL-07-040410V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH public host key files have mode 0644 or less permissive.
RHEL-07-040420V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH private host key files have mode 0600 or less permissive.
RHEL-07-040450V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon performs strict mode checking of home directory configuration files.
RHEL-07-040460V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon uses privilege separation.
RHEL-07-040470V3R6The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon does not allow compression or only allows compression after successful authentication.
RHEL-07-040520V3R6The Red Hat Enterprise Linux operating system must enable an application firewall, if available.
RHEL-07-040530V3R6The Red Hat Enterprise Linux operating system must display the date and time of the last successful account logon upon logon.
RHEL-07-040540V3R6The Red Hat Enterprise Linux operating system must not contain .shosts files.
RHEL-07-040550V3R6The Red Hat Enterprise Linux operating system must not contain shosts.equiv files.
RHEL-07-040600V3R6For Red Hat Enterprise Linux operating systems using DNS resolution, at least two name servers must be configured.
RHEL-07-040610V3R6The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-07-040611V3R6The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible on all interfaces.
RHEL-07-040612V3R6The Red Hat Enterprise Linux operating system must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-07-040620V3R6The Red Hat Enterprise Linux operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
RHEL-07-040630V3R6The Red Hat Enterprise Linux operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-07-040640V3R6The Red Hat Enterprise Linux operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-07-040641V3R6The Red Hat Enterprise Linux operating system must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-07-040650V3R6The Red Hat Enterprise Linux operating system must not allow interfaces to perform Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects by default.
RHEL-07-040660V3R6The Red Hat Enterprise Linux operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
RHEL-07-040670V3R6Network interfaces configured on the Red Hat Enterprise Linux operating system must not be in promiscuous mode.
RHEL-07-040680V3R6The Red Hat Enterprise Linux operating system must be configured to prevent unrestricted mail relaying.
RHEL-07-040690V3R6The Red Hat Enterprise Linux operating system must not have a File Transfer Protocol (FTP) server package installed unless needed.
RHEL-07-040700V3R6The Red Hat Enterprise Linux operating system must not have the Trivial File Transfer Protocol (TFTP) server package installed if not required for operational support.
RHEL-07-040710V3R6The Red Hat Enterprise Linux operating system must be configured so that remote X connections are disabled except to fulfill documented and validated mission requirements.
RHEL-07-040720V3R6The Red Hat Enterprise Linux operating system must be configured so that if the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon is configured to operate in secure mode.
RHEL-07-040730V3R6The Red Hat Enterprise Linux operating system must not have a graphical display manager installed unless approved.
RHEL-07-040740V3R6The Red Hat Enterprise Linux operating system must not be performing packet forwarding unless the system is a router.
RHEL-07-040750V3R6The Red Hat Enterprise Linux operating system must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
RHEL-07-040800V3R6SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default.
RHEL-07-040810V3R6The Red Hat Enterprise Linux operating system access control program must be configured to grant or deny system access to specific hosts and services.
RHEL-07-040820V3R6The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.
RHEL-07-040830V3R6The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.
RHEL-07-010020V3R6The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.
RHEL-07-020019V3R6The Red Hat Enterprise Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool.
RHEL-07-032000V3R6The Red Hat Enterprise Linux operating system must use a virus scan program.
RHEL-07-021031V3R6The Red Hat Enterprise Linux operating system must be configured so that all world-writable directories are owned by root, sys, bin, or an application user.
RHEL-07-040711V3R6The Red Hat Enterprise Linux operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-07-010341V3R6The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.
RHEL-07-010342V3R6The Red Hat Enterprise Linux operating system must use the invoking user's password for privilege escalation when using "sudo".
RHEL-07-010291V3R6The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.
RHEL-07-010339V3R6The Red Hat Enterprise Linux operating system must specify the default "include" directory for the /etc/sudoers file.
SLES-12-010000V3R1The SUSE operating system must be a vendor-supported release.
SLES-12-010010V3R1Vendor-packaged SUSE operating system security patches and updates must be installed and up to date.
SLES-12-010231V3R1The SUSE operating system must not be configured to allow blank or null passwords.
SLES-12-010390V3R1The SUSE operating system must display the date and time of the last successful account logon upon logon.
SLES-12-010400V3R1There must be no .shosts files on the SUSE operating system.
SLES-12-010410V3R1There must be no shosts.equiv files on the SUSE operating system.
SLES-12-010520V3R1The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).
SLES-12-010530V3R1The SUSE operating system file integrity tool must be configured to verify extended attributes.
SLES-12-010610V3R1The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence.
SLES-12-010611V3R1The SUSE operating system must disable the x86 Ctrl-Alt-Delete key sequence for Graphical User Interfaces.
SLES-12-010630V3R1The SUSE operating system must not have unnecessary accounts.
SLES-12-010650V3R1The SUSE operating system root account must be the only account having unrestricted access to the system.
SLES-12-010690V3R1All SUSE operating system files and directories must have a valid owner.
SLES-12-010700V3R1All SUSE operating system files and directories must have a valid group owner.
SLES-12-010710V3R1All SUSE operating system local interactive users must have a home directory assigned in the /etc/passwd file.
SLES-12-010720V3R1All SUSE operating system local interactive user accounts, upon creation, must be assigned a home directory.
SLES-12-010730V3R1All SUSE operating system local interactive user home directories defined in the /etc/passwd file must exist.
SLES-12-010740V3R1All SUSE operating system local interactive user home directories must have mode 0750 or less permissive.
SLES-12-010750V3R1All SUSE operating system local interactive user home directories must be group-owned by the home directory owners primary group.
SLES-12-010760V3R1All SUSE operating system local initialization files must have mode 0740 or less permissive.
SLES-12-010770V3R1All SUSE operating system local interactive user initialization files executable search paths must contain only paths that resolve to the users home directory.
SLES-12-010780V3R1All SUSE operating system local initialization files must not execute world-writable programs.
SLES-12-010790V3R1SUSE operating system file systems that contain user home directories must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010800V3R1SUSE operating system file systems that are used with removable media must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010810V3R1SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent files with the setuid and setgid bit set from being executed.
SLES-12-010820V3R1SUSE operating system file systems that are being imported via Network File System (NFS) must be mounted to prevent binary files from being executed.
SLES-12-010830V3R1All SUSE operating system world-writable directories must be group-owned by root, sys, bin, or an application group.
SLES-12-010840V3R1SUSE operating system kernel core dumps must be disabled unless needed.
SLES-12-010850V3R1A separate file system must be used for SUSE operating system user home directories (such as /home or an equivalent).
SLES-12-010860V3R1The SUSE operating system must use a separate file system for /var.
SLES-12-010870V3R1The SUSE operating system must use a separate file system for the system audit data path.
SLES-12-010910V3R1The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.
SLES-12-020199V3R1The SUSE operating system must not disable syscall auditing.
SLES-12-030130V3R1The SUSE operating system must display the date and time of the last successful account logon upon an SSH logon.
SLES-12-030200V3R1The SUSE operating system SSH daemon must be configured to not allow authentication using known hosts authentication.
SLES-12-030210V3R1The SUSE operating system SSH daemon public host key files must have mode 0644 or less permissive.
SLES-12-030220V3R1The SUSE operating system SSH daemon private host key files must have mode 0640 or less permissive.
SLES-12-030230V3R1The SUSE operating system SSH daemon must perform strict mode checking of home directory configuration files.
SLES-12-030240V3R1The SUSE operating system SSH daemon must use privilege separation.
SLES-12-030250V3R1The SUSE operating system SSH daemon must not allow compression or must only allow compression after successful authentication.
SLES-12-030260V3R1The SUSE operating system SSH daemon must disable forwarded remote X connections for interactive users, unless to fulfill documented and validated mission requirements.
SLES-12-030360V3R1The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets.
SLES-12-030361V3R1The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets.
SLES-12-030370V3R1The SUSE operating system must not forward Internet Protocol version 4 (IPv4) source-routed packets by default.
SLES-12-030380V3R1The SUSE operating system must not respond to Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
SLES-12-030390V3R1The SUSE operating system must prevent Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-12-030400V3R1The SUSE operating system must not allow interfaces to accept Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030401V3R1The SUSE operating system must not allow interfaces to accept Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030410V3R1The SUSE operating system must not allow interfaces to send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages by default.
SLES-12-030420V3R1The SUSE operating system must not send Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirects.
SLES-12-030430V3R1The SUSE operating system must not be performing Internet Protocol version 4 (IPv4) packet forwarding unless the system is a router.
SLES-12-030440V3R1The SUSE operating system must not have network interfaces in promiscuous mode unless approved and documented.
SLES-12-030611V3R1The SUSE operating system must use a virus scan program.
SLES-12-030261V3R1The SUSE operating system SSH daemon must prevent remote hosts from connecting to the proxy display.
SLES-12-010111V3R1The SUSE operating system must restrict privilege elevation to authorized personnel.
SLES-12-010112V3R1The SUSE operating system must use the invoking user's password for privilege escalation when using "sudo".
SLES-12-010631V3R1The SUSE operating system must not have unnecessary account capabilities.
SLES-12-030362V3R1The SUSE operating system must not forward Internet Protocol version 6 (IPv6) source-routed packets by default.
SLES-12-030363V3R1The SUSE operating system must prevent Internet Protocol version 6 (IPv6) Internet Control Message Protocol (ICMP) redirect messages from being accepted.
SLES-12-030364V3R1The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding unless the system is a router.
SLES-12-030365V3R1The SUSE operating system must not be performing Internet Protocol version 6 (IPv6) packet forwarding by default unless the system is a router.
SLES-12-010109V3R1The SUSE operating system must specify the default "include" directory for the /etc/sudoers file.
SLES-12-010221V3R1The SUSE operating system must not have accounts configured with blank or null passwords.
APPL-15-003013V1R1The macOS system must enable firmware password.
APPL-15-005110V1R1The macOS system must enforce enrollment in Mobile Device Management (MDM).
APPL-15-005120V1R1The macOS system must enable Recovery Lock.
APPL-15-005130V1R1The macOS system must enforce installation of XProtect Remediator and Gatekeeper updates automatically.
ALMA-09-011240V1R1AlmaLinux OS 9 must disable core dumps for all users.
ALMA-09-011350V1R1AlmaLinux OS 9 must disable acquiring, saving, and processing core dumps.
ALMA-09-011460V1R1AlmaLinux OS 9 must disable storing core dumps.
ALMA-09-011570V1R1AlmaLinux OS 9 must disable core dump backtraces.
ALMA-09-011680V1R1AlmaLinux OS 9 must disable the kernel.core_pattern.
ALMA-09-011790V1R1AlmaLinux OS 9 cron configuration files directory must be group-owned by root.
ALMA-09-011900V1R1AlmaLinux OS 9 cron configuration files directory must be owned by root.
ALMA-09-012010V1R1AlmaLinux OS 9 cron configuration directories must have a mode of 0700 or less permissive.
ALMA-09-012120V1R1AlmaLinux OS 9 /etc/crontab file must have mode 0600.
ALMA-09-012230V1R1AlmaLinux OS 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
ALMA-09-012340V1R1AlmaLinux OS 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
ALMA-09-012450V1R1All AlmaLinux OS 9 local files and directories must have a valid group owner.
ALMA-09-012560V1R1All AlmaLinux OS 9 local files and directories must have a valid owner.
ALMA-09-012670V1R1AlmaLinux OS 9 /etc/group- file must be group owned by root.
ALMA-09-012780V1R1AlmaLinux OS 9 /etc/group- file must be owned by root.
ALMA-09-012890V1R1AlmaLinux OS 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-013000V1R1AlmaLinux OS 9 /etc/group file must be group owned by root.
ALMA-09-013110V1R1AlmaLinux OS 9 /etc/group file must be owned by root.
ALMA-09-013220V1R1AlmaLinux OS 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-013330V1R1The /boot/grub2/grub.cfg file must be group-owned by root.
ALMA-09-013440V1R1The /boot/grub2/grub.cfg file must be owned by root.
ALMA-09-013550V1R1AlmaLinux OS 9 must disable the ability of systemd to spawn an interactive boot process.
ALMA-09-013660V1R1AlmaLinux OS 9 /etc/gshadow- file must be group-owned by root.
ALMA-09-013770V1R1AlmaLinux OS 9 /etc/gshadow- file must be owned by root.
ALMA-09-013880V1R1AlmaLinux OS 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
ALMA-09-013990V1R1AlmaLinux OS 9 /etc/gshadow file must be group-owned by root.
ALMA-09-014100V1R1AlmaLinux OS 9 /etc/gshadow file must be owned by root.
ALMA-09-014210V1R1AlmaLinux OS 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
ALMA-09-014320V1R1The graphical display manager must not be the default target on AlmaLinux OS 9 unless approved.
ALMA-09-014430V1R1AlmaLinux OS 9 must disable the user list at logon for graphical user interfaces.
ALMA-09-015640V1R1AlmaLinux OS 9 must enforce a delay of at least four seconds between logon prompts following a failed logon attempt.
ALMA-09-015750V1R1AlmaLinux OS 9 must not allow blank or null passwords.
ALMA-09-015860V1R1AlmaLinux OS 9 must not have accounts configured with blank or null passwords.
ALMA-09-015970V1R1AlmaLinux OS 9 /etc/passwd- file must be group-owned by root.
ALMA-09-016080V1R1AlmaLinux OS 9 /etc/passwd- file must be owned by root.
ALMA-09-016190V1R1AlmaLinux OS 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-016300V1R1AlmaLinux OS 9 /etc/passwd file must be group-owned by root.
ALMA-09-016410V1R1AlmaLinux OS 9 /etc/passwd file must be owned by root.
ALMA-09-016520V1R1AlmaLinux OS 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
ALMA-09-016630V1R1AlmaLinux OS 9 /etc/shadow- file must be group-owned by root.
ALMA-09-016740V1R1AlmaLinux OS 9 /etc/shadow- file must be owned by root.
ALMA-09-016850V1R1AlmaLinux OS 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
ALMA-09-016960V1R1AlmaLinux OS 9 /etc/shadow file must be group-owned by root.
ALMA-09-017070V1R1AlmaLinux OS 9 /etc/shadow file must be owned by root.
ALMA-09-017180V1R1AlmaLinux OS 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
ALMA-09-017290V1R1AlmaLinux OS 9 must restrict privilege elevation to authorized personnel.
ALMA-09-017400V1R1AlmaLinux OS 9 must use the invoking user's password for privilege escalation when using "sudo".
ALMA-09-017950V1R1AlmaLinux OS 9 must not have unauthorized accounts.
ALMA-09-018060V1R1AlmaLinux OS 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
ALMA-09-018170V1R1AlmaLinux OS 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
ALMA-09-018280V1R1AlmaLinux OS 9 must be configured so that the file integrity tool verifies extended attributes.
ALMA-09-018500V1R1AlmaLinux OS 9 must not accept router advertisements on all IPv6 interfaces.
ALMA-09-018610V1R1AlmaLinux OS 9 must ignore Internet Control Message Protocol (ICMP) redirect messages.
ALMA-09-018830V1R1AlmaLinux OS 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
ALMA-09-018940V1R1AlmaLinux OS 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
ALMA-09-019050V1R1AlmaLinux OS 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
ALMA-09-019160V1R1AlmaLinux OS 9 must not enable IP packet forwarding unless the system is a router.
ALMA-09-019270V1R1AlmaLinux OS 9 must not have unauthorized IP tunnels configured.
ALMA-09-019380V1R1AlmaLinux OS 9 must log packets with impossible addresses.
ALMA-09-019490V1R1AlmaLinux OS 9 must be configured to prevent unrestricted mail relaying.
ALMA-09-019600V1R1AlmaLinux OS 9 must have the nss-tools package installed.
ALMA-09-019710V1R1AlmaLinux OS 9 network interfaces must not be in promiscuous mode.
ALMA-09-019820V1R1AlmaLinux OS 9 must use reverse path filtering on all IP interfaces.
ALMA-09-019930V1R1AlmaLinux OS 9 must not send Internet Control Message Protocol (ICMP) redirects.
ALMA-09-020040V1R1There must be no .shosts files on AlmaLinux OS 9.
ALMA-09-020150V1R1There must be no shosts.equiv files on AlmaLinux OS 9.
ALMA-09-020260V1R1AlmaLinux OS 9 must not forward source-routed packets.
ALMA-09-020370V1R1AlmaLinux OS 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
ALMA-09-020480V1R1The AlmaLinux OS 9 SSH server configuration file must be group-owned by root.
ALMA-09-020590V1R1The AlmaLinux OS 9 SSH server configuration file must be owned by root.
ALMA-09-020700V1R1AlmaLinux OS 9 SSH server configuration files must have mode 0600 or less permissive.
ALMA-09-020810V1R1AlmaLinux OS 9 must not allow a noncertificate trusted host SSH logon to the system.
ALMA-09-020920V1R1AlmaLinux OS 9 SSH private host key files must have mode 0640 or less permissive.
ALMA-09-021030V1R1AlmaLinux OS 9 SSH public host key files must have mode 0644 or less permissive.
ALMA-09-021140V1R1AlmaLinux OS 9 SSH daemon must not allow known hosts authentication.
ALMA-09-021250V1R1AlmaLinux OS 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
ALMA-09-021360V1R1AlmaLinux OS 9 SSH daemon must not allow rhosts authentication.
ALMA-09-021470V1R1AlmaLinux OS 9 SSH daemon must disable remote X connections for interactive users.
ALMA-09-021580V1R1AlmaLinux OS 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
ALMA-09-021690V1R1If the Trivial File Transfer Protocol (TFTP) server is required, the TFTP daemon must be configured to operate in secure mode.
ALMA-09-021800V1R1AlmaLinux OS 9 must enable hardening for the Berkeley Packet Filter (BPF) just-in-time (JIT) compiler.
ALMA-09-021910V1R1AlmaLinux OS 9 effective dconf policy must match the policy keyfiles.
ALMA-09-022020V1R1AlmaLinux OS 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
ALMA-09-022130V1R1All AlmaLinux OS 9 local initialization files must have mode 0740 or less permissive.
ALMA-09-022240V1R1AlmaLinux OS 9 must have the gnutls-utils package installed.
ALMA-09-022350V1R1The kdump service on AlmaLinux OS 9 must be disabled.
ALMA-09-022460V1R1AlmaLinux OS 9 must disable the ability of a user to restart the system from the login screen.
ALMA-09-022570V1R1AlmaLinux OS 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
ALMA-09-022680V1R1AlmaLinux OS 9 must prevent special devices on file systems that are used with removable media.
ALMA-09-022790V1R1AlmaLinux OS 9 must prevent code from being executed on file systems that are used with removable media.
ALMA-09-022900V1R1AlmaLinux OS 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
ALMA-09-023010V1R1AlmaLinux OS 9 must disable the use of user namespaces.
ALMA-09-023120V1R1AlmaLinux OS 9 must prevent special devices on file systems that are imported via Network File System (NFS).
ALMA-09-023230V1R1AlmaLinux OS 9 must prevent code execution on file systems that are imported via Network File System (NFS).
ALMA-09-023450V1R1AlmaLinux OS 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
ALMA-09-023560V1R1AlmaLinux OS 9 must configure a DNS processing mode set be Network Manager.
ALMA-09-023670V1R1AlmaLinux OS 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
ALMA-09-023780V1R1AlmaLinux OS 9 must prevent special devices on nonroot local partitions.
ALMA-09-023890V1R1The root account must be the only account having unrestricted access to an AlmaLinux OS 9 system.
ALMA-09-024000V1R1AlmaLinux OS 9 must be configured so that the cryptographic hashes of system files match vendor values.
ALMA-09-024110V1R1AlmaLinux OS 9 must clear the page allocator to prevent use-after-free attacks.
ALMA-09-024220V1R1AlmaLinux OS 9 must display the date and time of the last successful account logon upon logon.
ALMA-09-024330V1R1AlmaLinux OS 9 security patches and updates must be installed and up to date.
ALMA-09-024440V1R1AlmaLinux OS 9 policycoreutils-python-utils package must be installed.
ALMA-09-024550V1R1AlmaLinux OS 9 must enable the hardware random number generator entropy gatherer service.
ALMA-09-024660V1R1AlmaLinux OS 9 must have the rng-tools package installed.
ALMA-09-024990V1R1AlmaLinux OS 9 system accounts must not have an interactive login shell.
ALMA-09-025100V1R1AlmaLinux OS 9 must use a separate file system for /tmp.
ALMA-09-025210V1R1Local AlmaLinux OS 9 initialization files must not execute world-writable programs.
ALMA-09-025320V1R1AlmaLinux OS 9 must use a separate file system for /var/log.
ALMA-09-025430V1R1AlmaLinux OS 9 must use a separate file system for /var.
ALMA-09-025540V1R1AlmaLinux OS 9 must use a separate file system for /var/tmp.
ALMA-09-025650V1R1AlmaLinux OS 9 must disable virtual system calls.
ALMA-09-025760V1R1AlmaLinux OS 9 must use cron logging.
ALMA-09-025870V1R1AlmaLinux OS 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
OL08-00-010000V1R6OL 8 must be a vendor-supported release.
OL08-00-010010V1R6OL 8 vendor-packaged system security patches and updates must be installed and up to date.
OL08-00-010382V1R6OL 8 must restrict privilege elevation to authorized personnel.
OL08-00-010383V1R6OL 8 must use the invoking user's password for privilege escalation when using "sudo".
OL08-00-010424V1R6OL 8 must not let Meltdown and Spectre exploit critical vulnerabilities in modern processors.
OL08-00-010460V1R6There must be no "shosts.equiv" files on the OL 8 operating system.
OL08-00-010470V1R6There must be no ".shosts" files on the OL 8 operating system.
OL08-00-010471V1R6OL 8 must enable the hardware random number generator entropy gatherer service.
OL08-00-010472V1R6OL 8 must have the packages required to use the hardware random number generator entropy gatherer service.
OL08-00-010480V1R6The OL 8 SSH public host key files must have mode "0644" or less permissive.
OL08-00-010490V1R6The OL 8 SSH private host key files must have mode "0640" or less permissive.
OL08-00-010500V1R6The OL 8 SSH daemon must perform strict mode checking of home directory configuration files.
OL08-00-010520V1R6The OL 8 SSH daemon must not allow authentication using known host's authentication.
OL08-00-010521V1R6The OL 8 SSH daemon must not allow Kerberos authentication, except to fulfill documented and validated mission requirements.
OL08-00-010522V1R6The OL 8 SSH daemon must not allow GSSAPI authentication, except to fulfill documented and validated mission requirements.
OL08-00-010540V1R6OL 8 must use a separate file system for "/var".
OL08-00-010541V1R6OL 8 must use a separate file system for "/var/log".
OL08-00-010542V1R6OL 8 must use a separate file system for the system audit data path.
OL08-00-010543V1R6OL 8 must use a separate file system for "/tmp".
OL08-00-010544V1R6OL 8 must use a separate file system for /var/tmp.
OL08-00-010561V1R6OL 8 must have the rsyslog service enabled and active.
OL08-00-010570V1R6OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that contain user home directories.
OL08-00-010571V1R6OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot directory.
OL08-00-010572V1R6OL 8 must prevent files with the setuid and setgid bit set from being executed on the /boot/efi directory.
OL08-00-010580V1R6OL 8 must prevent special devices on non-root local partitions.
OL08-00-010590V1R6OL 8 file systems that contain user home directories must not execute binary files.
OL08-00-010600V1R6OL 8 file systems must not interpret character or block special devices from untrusted file systems.
OL08-00-010610V1R6OL 8 file systems must not execute binary files on removable media.
OL08-00-010620V1R6OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL08-00-010630V1R6OL 8 file systems must not execute binary files that are imported via Network File System (NFS).
OL08-00-010640V1R6OL 8 file systems must not interpret character or block special devices that are imported via NFS.
OL08-00-010650V1R6OL 8 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
OL08-00-010660V1R6Local OL 8 initialization files must not execute world-writable programs.
OL08-00-010671V1R6OL 8 must disable the "kernel.core_pattern".
OL08-00-010672V1R6OL 8 must disable acquiring, saving, and processing core dumps.
OL08-00-010673V1R6OL 8 must disable core dumps for all users.
OL08-00-010674V1R6OL 8 must disable storing core dumps.
OL08-00-010675V1R6OL 8 must disable core dump backtraces.
OL08-00-010680V1R6For OL 8 systems using Domain Name Servers (DNS) resolution, at least two name servers must be configured.
OL08-00-010690V1R6Executable search paths within the initialization files of all local interactive OL 8 users must only contain paths that resolve to the system default or the user's home directory.
OL08-00-010700V1R6All OL 8 world-writable directories must be owned by root, sys, bin, or an application user.
OL08-00-010710V1R6All OL 8 world-writable directories must be group-owned by root, sys, bin, or an application group.
OL08-00-010720V1R6All OL 8 local interactive users must have a home directory assigned in the "/etc/passwd" file.
OL08-00-010730V1R6All OL 8 local interactive user home directories must have mode "0750" or less permissive.
OL08-00-010731V1R6All OL 8 local interactive user home directory files must have mode "0750" or less permissive.
OL08-00-010740V1R6All OL 8 local interactive user home directories must be group-owned by the home directory owner's primary group.
OL08-00-010741V1R6OL 8 must be configured so that all files and directories contained in local interactive user home directories are group-owned by a group of which the home directory owner is a member.
OL08-00-010750V1R6All OL 8 local interactive user home directories defined in the "/etc/passwd" file must exist.
OL08-00-010760V1R6All OL 8 local interactive user accounts must be assigned a home directory upon creation.
OL08-00-010770V1R6All OL 8 local initialization files must have mode "0740" or less permissive.
OL08-00-010780V1R6All OL 8 files and directories must have a valid owner.
OL08-00-010790V1R6All OL 8 files and directories must have a valid group owner.
OL08-00-010800V1R6A separate OL 8 filesystem must be used for user home directories (such as "/home" or an equivalent).
OL08-00-020032V1R6OL 8 must disable the user list at logon for graphical user interfaces.
OL08-00-020320V1R6OL 8 must not have unnecessary accounts.
OL08-00-020330V1R6OL 8 must not allow accounts configured with blank or null passwords.
OL08-00-020331V1R6OL 8 must not allow blank or null passwords in the system-auth file.
OL08-00-020332V1R6OL 8 must not allow blank or null passwords in the password-auth file.
OL08-00-020340V1R6OL 8 must display the date and time of the last successful account logon upon logon.
OL08-00-020350V1R6OL 8 must display the date and time of the last successful account logon upon an SSH logon.
OL08-00-030010V1R6Cron logging must be implemented in OL 8.
OL08-00-030061V1R6The OL 8 audit system must audit local events.
OL08-00-030063V1R6OL 8 must resolve audit information before writing to disk.
OL08-00-030670V1R6OL 8 must have the packages required for offloading audit logs installed.
OL08-00-030680V1R6OL 8 must have the packages required for encrypting offloaded audit logs installed.
OL08-00-040021V1R6OL 8 must not have the asynchronous transfer mode (ATM) kernel module installed if not required for operational support.
OL08-00-040022V1R6OL 8 must not have the Controller Area Network (CAN) kernel module installed if not required for operational support.
OL08-00-040023V1R6OL 8 must not have the stream control transmission protocol (SCTP) kernel module installed if not required for operational support.
OL08-00-040170V1R6The x86 Ctrl-Alt-Delete key sequence must be disabled on OL 8.
OL08-00-040171V1R6The x86 Ctrl-Alt-Delete key sequence in OL 8 must be disabled if a graphical user interface is installed.
OL08-00-040172V1R6OL 8 must disable the systemd Ctrl-Alt-Delete burst key sequence.
OL08-00-040180V1R6OL 8 must disable the debug-shell systemd service.
OL08-00-040190V1R6The Trivial File Transfer Protocol (TFTP) server package must not be installed if not required for OL 8 operational support.
OL08-00-040200V1R6The root account must be the only account having unrestricted access to the OL 8 system.
OL08-00-040209V1R6OL 8 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL08-00-040210V1R6OL 8 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL08-00-040220V1R6OL 8 must not send Internet Control Message Protocol (ICMP) redirects.
OL08-00-040230V1R6OL 8 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL08-00-040239V1R6OL 8 must not forward IPv4 source-routed packets.
OL08-00-040240V1R6OL 8 must not forward IPv6 source-routed packets.
OL08-00-040249V1R6OL 8 must not forward IPv4 source-routed packets by default.
OL08-00-040250V1R6OL 8 must not forward IPv6 source-routed packets by default.
OL08-00-040260V1R6OL 8 must not enable IPv6 packet forwarding unless the system is a router.
OL08-00-040261V1R6OL 8 must not accept router advertisements on all IPv6 interfaces.
OL08-00-040262V1R6OL 8 must not accept router advertisements on all IPv6 interfaces by default.
OL08-00-040270V1R6OL 8 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
OL08-00-040279V1R6OL 8 must ignore IPv4 Internet Control Message Protocol (ICMP) redirect messages.
OL08-00-040280V1R6OL 8 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
OL08-00-040281V1R6OL 8 must disable access to the network "bpf" syscall from unprivileged processes.
OL08-00-040282V1R6OL 8 must restrict the use of "ptrace" to descendant processes.
OL08-00-040283V1R6OL 8 must restrict exposed kernel pointer addresses access.
OL08-00-040284V1R6OL 8 must disable the use of user namespaces.
OL08-00-040285V1R6OL 8 must use reverse path filtering on all IPv4 interfaces.
OL08-00-040286V1R6OL 8 must enable hardening for the Berkeley Packet Filter Just-in-time compiler.
OL08-00-040290V1R6OL 8 must be configured to prevent unrestricted mail relaying.
OL08-00-040300V1R6The OL 8 file integrity tool must be configured to verify extended attributes.
OL08-00-040310V1R6The OL 8 file integrity tool must be configured to verify Access Control Lists (ACLs).
OL08-00-040320V1R6The graphical display manager must not be installed on OL 8 unless approved.
OL08-00-040330V1R6OL 8 network interfaces must not be in promiscuous mode.
OL08-00-040340V1R6OL 8 remote X connections for interactive users must be disabled unless to fulfill documented and validated mission requirements.
OL08-00-040341V1R6The OL 8 SSH daemon must prevent remote hosts from connecting to the proxy display.
OL08-00-040350V1R6If the Trivial File Transfer Protocol (TFTP) server is required, the OL 8 TFTP daemon must be configured to operate in secure mode.
OL08-00-040360V1R6A File Transfer Protocol (FTP) server package must not be installed unless mission essential on OL 8.
OL08-00-040370V1R6OL 8 must not have the "gssproxy" package installed if not required for operational support.
OL08-00-040380V1R6OL 8 must not have the "iprutils" package installed if not required for operational support.
OL08-00-040390V1R6OL 8 must not have the "tuned" package installed if not required for operational support.
OL08-00-010121V1R6The OL 8 operating system must not have accounts configured with blank or null passwords.
OL08-00-010379V1R6OL 8 must specify the default "include" directory for the /etc/sudoers file.
OL08-00-020101V1R6OL 8 must ensure the password complexity module is enabled in the system-auth file.
OL08-00-020102V1R6OL 8 systems below version 8.4 must ensure the password complexity module in the system-auth file is configured for three retries or less.
OL08-00-020103V1R6OL 8 systems below version 8.4 must ensure the password complexity module in the password-auth file is configured for three retries or less.
OL08-00-020104V1R6OL 8 systems, version 8.4 and above, must ensure the password complexity module is configured for three retries or less.
OL08-00-040259V1R6OL 8 must not enable IPv4 packet forwarding unless the system is a router.
OL08-00-040321V1R6The graphical display manager must not be the default target on OL 8 unless approved.
OL09-00-000003V1R1OL 9 must be configured so that a separate file system must be used for user home directories (such as /home or an equivalent).
OL09-00-000004V1R1OL 9 must use a separate file system for /tmp.
OL09-00-000005V1R1OL 9 must use a separate file system for /var.
OL09-00-000006V1R1OL 9 must use a separate file system for /var/log.
OL09-00-000007V1R1OL 9 must use a separate file system for /var/tmp.
OL09-00-000015V1R1OL 9 vendor packaged system security patches and updates must be installed and up to date.
OL09-00-000020V1R1OL 9 must be configured so that the graphical display manager is not the default target unless approved.
OL09-00-000135V1R1OL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
OL09-00-000140V1R1OL 9 must not have the quagga package installed.
OL09-00-000145V1R1OL 9 must not have a graphical display manager installed unless approved.
OL09-00-000210V1R1OL 9 policycoreutils-python-utils package must be installed.
OL09-00-000224V1R1OL 9 must be configured so that the firewall employs a deny-all, allow-by-exception policy for allowing connections to other systems.
OL09-00-000231V1R1OL 9 must use the invoking user's password for privilege escalation when using sudo.
OL09-00-000232V1R1OL 9 must restrict privilege elevation to authorized personnel.
OL09-00-000243V1R1OL 9 must be configured so that the cryptographic hashes of system files match vendor values.
OL09-00-000260V1R1OL 9 must have the openssh-clients package installed.
OL09-00-000302V1R1OL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
OL09-00-000303V1R1OL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
OL09-00-000304V1R1OL 9 must be configured so that the file integrity tool verifies extended attributes.
OL09-00-000351V1R1OL 9 must be configured so that the rsyslog service is active.
OL09-00-000360V1R1OL 9 must enable the hardware random number generator entropy gatherer service.
OL09-00-000370V1R1OL 9 must have the rng-tools package installed.
OL09-00-000380V1R1OL 9 must have the nss-tools package installed.
OL09-00-000430V1R1OL 9 must have the gnutls-utils package installed.
OL09-00-000880V1R1OL 9 must write audit records to disk.
OL09-00-001000V1R1OL 9 must ensure the password complexity module is enabled in the system-auth file.
OL09-00-001110V1R1OL 9 must not allow blank or null passwords.
OL09-00-001130V1R1OL 9 must not have accounts configured with blank or null passwords.
OL09-00-002010V1R1OL 9 must be configured so that the Network File System (NFS) is configured to use RPCSEC_GSS.
OL09-00-002011V1R1OL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
OL09-00-002012V1R1OL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
OL09-00-002013V1R1OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
OL09-00-002020V1R1OL 9 must prevent code from being executed on file systems that are used with removable media.
OL09-00-002021V1R1OL 9 must prevent special devices on file systems that are used with removable media.
OL09-00-002022V1R1OL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
OL09-00-002072V1R1OL 9 must prevent code from being executed on file systems that contain user home directories.
OL09-00-002080V1R1OL 9 must prevent special devices on nonroot local partitions.
OL09-00-002102V1R1OL 9 must disable the user list at logon for graphical user interfaces.
OL09-00-002107V1R1OL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
OL09-00-002127V1R1OL 9 must disable the ability of a user to restart the system from the login screen.
OL09-00-002128V1R1OL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
OL09-00-002129V1R1OL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
OL09-00-002162V1R1OL 9 effective dconf policy must match the policy keyfiles.
OL09-00-002301V1R1OL 9 must define default permissions for the bash shell.
OL09-00-002302V1R1OL 9 must define default permissions for the c shell.
OL09-00-002303V1R1OL 9 must define default permissions for the system default profile.
OL09-00-002348V1R1OL 9 SSH daemon must not allow rhosts authentication.
OL09-00-002349V1R1OL 9 SSH daemon must not allow known hosts authentication.
OL09-00-002350V1R1OL 9 SSH daemon must disable remote X connections for interactive users.
OL09-00-002351V1R1OL 9 SSH daemon must perform strict mode checking of home directory configuration files.
OL09-00-002352V1R1OL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
OL09-00-002354V1R1OL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
OL09-00-002355V1R1OL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
OL09-00-002360V1R1OL 9 must require reauthentication when using the "sudo" command.
OL09-00-002370V1R1OL 9 must disable the use of user namespaces.
OL09-00-002380V1R1OL 9 must disable the kernel.core_pattern.
OL09-00-002381V1R1OL 9 must disable core dump backtraces.
OL09-00-002382V1R1OL 9 must disable storing core dumps.
OL09-00-002383V1R1OL 9 must disable core dumps for all users.
OL09-00-002384V1R1OL 9 must disable acquiring, saving, and processing core dumps.
OL09-00-002385V1R1OL 9 must be configured so that the kdump service is disabled.
OL09-00-002392V1R1OL 9 must disable the ability of systemd to spawn an interactive boot process.
OL09-00-002419V1R1OL 9 file systems must not contain shosts.equiv files.
OL09-00-002420V1R1OL 9 file systems must not contain .shosts files.
OL09-00-002425V1R1OL 9 must be configured to prevent unrestricted mail relaying.
OL09-00-002426V1R1OL 9 Trivial File Transfer Protocol (TFTP) daemon must be configured to operate in secure mode if the TFTP server is required.
OL09-00-002427V1R1OL 9 must be configured so that local initialization files do not execute world-writable programs.
OL09-00-002430V1R1OL 9 must enable hardening for the Berkeley Packet Filter (BPF) just-in-time compiler.
OL09-00-002500V1R1OL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
OL09-00-002501V1R1OL 9 must not have unauthorized accounts.
OL09-00-002502V1R1OL 9 SSH private host key files must have mode 0640 or less permissive.
OL09-00-002503V1R1OL 9 SSH public host key files must have mode 0644 or less permissive.
OL09-00-002507V1R1OL 9 SSH server configuration file must be group-owned by root.
OL09-00-002508V1R1OL 9 SSH server configuration file must be owned by root.
OL09-00-002509V1R1OL 9 SSH server configuration file must have mode 0600 or less permissive.
OL09-00-002511V1R1OL 9 local files and directories must have a valid group owner.
OL09-00-002512V1R1OL 9 local files and directories must have a valid owner.
OL09-00-002513V1R1OL 9 local initialization files must have mode 0740 or less permissive.
OL09-00-002514V1R1OL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
OL09-00-002515V1R1OL 9 local interactive user home directories must have mode 0750 or less permissive.
OL09-00-002530V1R1OL 9 /boot/grub2/grub.cfg file must be group-owned by root.
OL09-00-002531V1R1OL 9 /boot/grub2/grub.cfg file must be owned by root.
OL09-00-002532V1R1OL 9 /etc/group file must be group-owned by root.
OL09-00-002533V1R1OL 9 /etc/group- file must be group-owned by root.
OL09-00-002534V1R1OL 9 /etc/group file must be owned by root.
OL09-00-002535V1R1OL 9 /etc/group- file must be owned by root.
OL09-00-002536V1R1OL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002537V1R1OL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002538V1R1OL 9 /etc/gshadow file must be group-owned by root.
OL09-00-002539V1R1OL 9 /etc/gshadow- file must be group-owned by root.
OL09-00-002540V1R1OL 9 /etc/gshadow file must be owned by root.
OL09-00-002541V1R1OL 9 /etc/gshadow- file must be owned by root.
OL09-00-002542V1R1OL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
OL09-00-002543V1R1OL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
OL09-00-002544V1R1OL 9 /etc/passwd file must be group-owned by root.
OL09-00-002545V1R1OL 9 /etc/passwd- file must be group-owned by root.
OL09-00-002546V1R1OL 9 /etc/passwd file must be owned by root.
OL09-00-002547V1R1OL 9 /etc/passwd- file must be owned by root.
OL09-00-002548V1R1OL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002549V1R1OL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
OL09-00-002550V1R1OL 9 /etc/shadow file must be group-owned by root.
OL09-00-002551V1R1OL 9 /etc/shadow- file must be group-owned by root.
OL09-00-002552V1R1OL 9 /etc/shadow file must be owned by root.
OL09-00-002553V1R1OL 9 /etc/shadow- file must be owned by root.
OL09-00-002554V1R1OL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
OL09-00-002555V1R1OL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
OL09-00-002580V1R1OL 9 cron configuration directories must have a mode of 0700 or less permissive.
OL09-00-002581V1R1OL 9 cron configuration files directory must be group-owned by root.
OL09-00-002582V1R1OL 9 cron configuration files directory must be owned by root.
OL09-00-002583V1R1OL 9 /etc/crontab file must have mode 0600.
OL09-00-003000V1R1OL 9 must be configured so that the root account is the only account having unrestricted access to the system.
OL09-00-003002V1R1OL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
OL09-00-003050V1R1OL 9 local interactive user home directories defined in the /etc/passwd file must exist.
OL09-00-003051V1R1OL 9 system accounts must not have an interactive login shell.
OL09-00-003052V1R1OL 9 local interactive user accounts must be assigned a home directory upon creation.
OL09-00-003053V1R1OL 9 must be configured so that executable search paths within the initialization files of all local interactive users must only contain paths that resolve to the system default or the users home directory.
OL09-00-003060V1R1OL 9 must set the umask value to 077 for all local interactive user accounts.
OL09-00-005010V1R1OL 9 must use cron logging.
OL09-00-005030V1R1OL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
OL09-00-006002V1R1OL 9 must configure a DNS processing mode set be Network Manager.
OL09-00-006003V1R1OL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
OL09-00-006004V1R1OL 9 network interfaces must not be in promiscuous mode.
OL09-00-006010V1R1OL 9 must not have unauthorized IP tunnels configured.
OL09-00-006020V1R1OL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
OL09-00-006021V1R1OL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
OL09-00-006022V1R1OL 9 must log IPv4 packets with impossible addresses.
OL09-00-006023V1R1OL 9 must log IPv4 packets with impossible addresses by default.
OL09-00-006024V1R1OL 9 must use reverse path filtering on all IPv4 interfaces.
OL09-00-006025V1R1OL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL09-00-006026V1R1OL 9 must not forward IPv4 source-routed packets by default.
OL09-00-006027V1R1OL 9 must use a reverse-path filter for IPv4 network traffic, when possible, by default.
OL09-00-006028V1R1OL 9 must not enable IPv4 packet forwarding unless the system is a router.
OL09-00-006030V1R1OL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
OL09-00-006031V1R1OL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
OL09-00-006032V1R1OL 9 must not send Internet Control Message Protocol (ICMP) redirects.
OL09-00-006033V1R1OL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
OL09-00-006040V1R1OL 9 must not accept router advertisements on all IPv6 interfaces.
OL09-00-006041V1R1OL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
OL09-00-006042V1R1OL 9 must not forward IPv6 source-routed packets.
OL09-00-006043V1R1OL 9 must not enable IPv6 packet forwarding unless the system is a router.
OL09-00-006044V1R1OL 9 must not accept router advertisements on all IPv6 interfaces by default.
OL09-00-006045V1R1OL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
OL09-00-006046V1R1OL 9 must not forward IPv6 source-routed packets by default.
UBTU-24-100010V1R1Ubuntu 24.04 LTS must not have the "systemd-timesyncd" package installed.
UBTU-24-100020V1R1Ubuntu 24.04 LTS must not have the "ntp" package installed.
UBTU-24-100700V1R1Ubuntu 24.04 LTS must have the "chrony" package installed.
UBTU-24-300021V1R1Ubuntu 24.04 LTS must require users to reauthenticate for privilege escalation or when changing roles.
UBTU-24-300022V1R1Ubuntu 24.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-24-300023V1R1Ubuntu 24.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-24-300024V1R1Ubuntu 24.04 LTS must display the date and time of the last successful account logon upon logon.
UBTU-24-300025V1R1Ubuntu 24.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-24-300026V1R1Ubuntu 24.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-24-300027V1R1Ubuntu 24.04 LTS must not have accounts configured with blank or null passwords.
UBTU-24-300028V1R1Ubuntu 24.04 LTS must not allow accounts configured in Pluggable Authentication Modules (PAM) with blank or null passwords.
UBTU-24-300029V1R1Ubuntu 24.04 LTS must generate audit records for all events that affect the systemd journal files.
UBTU-22-211015V1R1Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence.
UBTU-22-215015V1R1Ubuntu 22.04 LTS must have the "chrony" package installed.
UBTU-22-215020V1R1Ubuntu 22.04 LTS must not have the "systemd-timesyncd" package installed.
UBTU-22-215025V1R1Ubuntu 22.04 LTS must not have the "ntp" package installed.
UBTU-22-255040V1R1Ubuntu 22.04 LTS must be configured so that remote X connections are disabled, unless to fulfill documented and validated mission requirements.
UBTU-22-255045V1R1Ubuntu 22.04 LTS SSH daemon must prevent remote hosts from connecting to the proxy display.
UBTU-22-271030V1R1Ubuntu 22.04 LTS must disable the x86 Ctrl-Alt-Delete key sequence if a graphical user interface is installed.
UBTU-22-412015V1R1Ubuntu 22.04 LTS must display the date and time of the last successful account logon upon logon.
UBTU-22-611060V1R1Ubuntu 22.04 LTS must not allow accounts configured with blank or null passwords.
UBTU-22-611065V1R1Ubuntu 22.04 LTS must not have accounts configured with blank or null passwords.
UBTU-22-654190V1R1Ubuntu 22.04 LTS must generate audit records for all events that affect the systemd journal files.
WN11-00-000005V1R6Domain-joined systems must use Windows 11 Enterprise Edition 64-bit version.
WN11-00-000040V1R6Windows 11 systems must be maintained at a supported servicing level.
WN11-00-000045V1R6The Windows 11 system must use an antivirus program.
WN11-00-000055V1R6Alternate operating systems must not be permitted on the same system.
WN11-00-000075V1R6Only accounts responsible for the backup operations must be members of the Backup Operators group.
WN11-00-000085V1R6Standard local user accounts must not exist on a system in a domain.
WN11-00-000130V1R6Software certificate installation files must be removed from Windows 11.
WN11-00-000135V1R6A host-based firewall must be installed and enabled on the system.
WN11-00-000190V1R6Orphaned security identifiers (SIDs) must be removed from user rights on Windows 11.
WN11-00-000230V1R6The system must notify the user when a Bluetooth device attempts to connect.
WN11-00-000240V1R6Administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
WN11-CC-000020V1R6IPv6 source routing must be configured to highest protection.
WN11-CC-000025V1R6The system must be configured to prevent IP source routing.
WN11-CC-000030V1R6The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
WN11-CC-000040V1R6Insecure logons to an SMB server must be disabled.
WN11-CC-000050V1R6Hardened UNC Paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN11-CC-000060V1R6Connections to non-domain networks when connected to a domain authenticated network must be blocked.
WN11-CC-000065V1R6Wi-Fi Sense must be disabled.
WN11-CC-000068V1R6Windows 11 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN11-CC-000070V1R6Virtualization-based Security must be enabled on Windows 11 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN11-CC-000075V1R6Credential Guard must be running on Windows 11 domain-joined systems.
WN11-CC-000080V1R6Virtualization-based protection of code integrity must be enabled.
WN11-CC-000085V1R6Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
WN11-CC-000090V1R6Group Policy objects must be reprocessed even if they have not changed.
WN11-CC-000115V1R6Systems must at least attempt device authentication using certificates.
WN11-CC-000170V1R6The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
WN11-CC-000195V1R6Enhanced anti-spoofing for facial recognition must be enabled on Windows 11.
WN11-CC-000204V1R6Enhanced diagnostic data must be limited to the minimum required to support Windows Analytics.
WN11-CC-000206V1R6Windows Update must not obtain updates from other PCs on the internet.
WN11-CC-000225V1R6File Explorer shell protocol must run in protected mode.
WN11-CC-000255V1R6The use of a hardware security device with Windows Hello for Business must be enabled.
WN11-CC-000260V1R6Windows 11 must be configured to require a minimum pin length of six characters or greater.
WN11-CC-000295V1R6Attachments must be prevented from being downloaded from RSS feeds.
WN11-CC-000320V1R6Users must be notified if a web-based program attempts to install software.
WN11-SO-000015V1R6Local accounts with blank passwords must be restricted to prevent access from the network.
WN11-SO-000020V1R6The built-in administrator account must be renamed.
WN11-SO-000025V1R6The built-in guest account must be renamed.
WN11-SO-000050V1R6The computer account password must not be prevented from being reset.
WN11-SO-000055V1R6The maximum age for machine account passwords must be configured to 30 days or less.
WN11-SO-000085V1R6Caching of logon credentials must be limited.
WN11-SO-000095V1R6The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN11-SO-000140V1R6Anonymous SID/Name translation must not be allowed.
WN11-SO-000145V1R6Anonymous enumeration of SAM accounts must not be allowed.
WN11-SO-000160V1R6The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
WN11-SO-000180V1R6NTLM must be prevented from falling back to a Null session.
WN11-SO-000185V1R6PKU2U authentication using online identities must be prevented.
WN11-SO-000205V1R6The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
WN11-SO-000210V1R6The system must be configured to the required LDAP client signing level.
WN11-SO-000215V1R6The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
WN11-SO-000220V1R6The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
WN11-SO-000240V1R6The default permissions of global system objects must be increased.
WN11-UC-000020V1R6Zone information must be preserved when saving attachments.
WN11-00-000395V1R6Windows 11 must not have portproxy enabled or in use.
RHEL-09-211010V2R5RHEL 9 must be a vendor-supported release.
RHEL-09-211015V2R5RHEL 9 vendor packaged system security patches and updates must be installed and up to date.
RHEL-09-211030V2R5The graphical display manager must not be the default target on RHEL 9 unless approved.
RHEL-09-211035V2R5RHEL 9 must enable the hardware random number generator entropy gatherer service.
RHEL-09-212015V2R5RHEL 9 must disable the ability of systemd to spawn an interactive boot process.
RHEL-09-212025V2R5RHEL 9 /boot/grub2/grub.cfg file must be group-owned by root.
RHEL-09-212030V2R5RHEL 9 /boot/grub2/grub.cfg file must be owned by root.
RHEL-09-212035V2R5RHEL 9 must disable virtual system calls.
RHEL-09-212040V2R5RHEL 9 must clear the page allocator to prevent use-after-free attacks.
RHEL-09-213020V2R5RHEL 9 must prevent the loading of a new kernel for later execution.
RHEL-09-213040V2R5RHEL 9 must disable the kernel.core_pattern.
RHEL-09-213085V2R5RHEL 9 must disable core dump backtraces.
RHEL-09-213090V2R5RHEL 9 must disable storing core dumps.
RHEL-09-213095V2R5RHEL 9 must disable core dumps for all users.
RHEL-09-213100V2R5RHEL 9 must disable acquiring, saving, and processing core dumps.
RHEL-09-213105V2R5RHEL 9 must disable the use of user namespaces.
RHEL-09-213115V2R5The kdump service on RHEL 9 must be disabled.
RHEL-09-214030V2R5RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values.
RHEL-09-215020V2R5RHEL 9 must not have the sendmail package installed.
RHEL-09-215060V2R5RHEL 9 must not have a Trivial File Transfer Protocol (TFTP) server package installed.
RHEL-09-215065V2R5RHEL 9 must not have the quagga package installed.
RHEL-09-215070V2R5A graphical display manager must not be installed on RHEL 9 unless approved.
RHEL-09-215080V2R5RHEL 9 must have the gnutls-utils package installed.
RHEL-09-215085V2R5RHEL 9 must have the nss-tools package installed.
RHEL-09-215090V2R5RHEL 9 must have the rng-tools package installed.
RHEL-09-231010V2R5A separate RHEL 9 file system must be used for user home directories (such as /home or an equivalent).
RHEL-09-231015V2R5RHEL 9 must use a separate file system for /tmp.
RHEL-09-231020V2R5RHEL 9 must use a separate file system for /var.
RHEL-09-231025V2R5RHEL 9 must use a separate file system for /var/log.
RHEL-09-231035V2R5RHEL 9 must use a separate file system for /var/tmp.
RHEL-09-231055V2R5RHEL 9 must prevent code from being executed on file systems that contain user home directories.
RHEL-09-231065V2R5RHEL 9 must prevent special devices on file systems that are imported via Network File System (NFS).
RHEL-09-231070V2R5RHEL 9 must prevent code from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231075V2R5RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are imported via Network File System (NFS).
RHEL-09-231080V2R5RHEL 9 must prevent code from being executed on file systems that are used with removable media.
RHEL-09-231085V2R5RHEL 9 must prevent special devices on file systems that are used with removable media.
RHEL-09-231090V2R5RHEL 9 must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.
RHEL-09-231200V2R5RHEL 9 must prevent special devices on non-root local partitions.
RHEL-09-232040V2R5RHEL 9 permissions of cron configuration files and directories must not be modified from the operating system defaults.
RHEL-09-232045V2R5All RHEL 9 local initialization files must have mode 0740 or less permissive.
RHEL-09-232050V2R5All RHEL 9 local interactive user home directories must have mode 0750 or less permissive.
RHEL-09-232055V2R5RHEL 9 /etc/group file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232060V2R5RHEL 9 /etc/group- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232065V2R5RHEL 9 /etc/gshadow file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232070V2R5RHEL 9 /etc/gshadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232075V2R5RHEL 9 /etc/passwd file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232080V2R5RHEL 9 /etc/passwd- file must have mode 0644 or less permissive to prevent unauthorized access.
RHEL-09-232085V2R5RHEL 9 /etc/shadow- file must have mode 0000 or less permissive to prevent unauthorized access.
RHEL-09-232090V2R5RHEL 9 /etc/group file must be owned by root.
RHEL-09-232095V2R5RHEL 9 /etc/group file must be group-owned by root.
RHEL-09-232100V2R5RHEL 9 /etc/group- file must be owned by root.
RHEL-09-232105V2R5RHEL 9 /etc/group- file must be group-owned by root.
RHEL-09-232110V2R5RHEL 9 /etc/gshadow file must be owned by root.
RHEL-09-232115V2R5RHEL 9 /etc/gshadow file must be group-owned by root.
RHEL-09-232120V2R5RHEL 9 /etc/gshadow- file must be owned by root.
RHEL-09-232125V2R5RHEL 9 /etc/gshadow- file must be group-owned by root.
RHEL-09-232130V2R5RHEL 9 /etc/passwd file must be owned by root.
RHEL-09-232135V2R5RHEL 9 /etc/passwd file must be group-owned by root.
RHEL-09-232140V2R5RHEL 9 /etc/passwd- file must be owned by root.
RHEL-09-232145V2R5RHEL 9 /etc/passwd- file must be group-owned by root.
RHEL-09-232150V2R5RHEL 9 /etc/shadow file must be owned by root.
RHEL-09-232155V2R5RHEL 9 /etc/shadow file must be group-owned by root.
RHEL-09-232160V2R5RHEL 9 /etc/shadow- file must be owned by root.
RHEL-09-232165V2R5RHEL 9 /etc/shadow- file must be group-owned by root.
RHEL-09-232230V2R5RHEL 9 cron configuration files directory must be owned by root.
RHEL-09-232235V2R5RHEL 9 cron configuration files directory must be group-owned by root.
RHEL-09-232240V2R5All RHEL 9 world-writable directories must be owned by root, sys, bin, or an application user.
RHEL-09-232250V2R5All RHEL 9 local files and directories must have a valid group owner.
RHEL-09-232255V2R5All RHEL 9 local files and directories must have a valid owner.
RHEL-09-232260V2R5RHEL 9 must be configured so that all system device files are correctly labeled to prevent unauthorized modification.
RHEL-09-232270V2R5RHEL 9 /etc/shadow file must have mode 0000 to prevent unauthorized access.
RHEL-09-251020V2R5The RHEL 9 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.
RHEL-09-251040V2R5RHEL 9 network interfaces must not be in promiscuous mode.
RHEL-09-251045V2R5RHEL 9 must enable hardening for the Berkeley Packet Filter just-in-time compiler.
RHEL-09-252035V2R5RHEL 9 systems using Domain Name Servers (DNS) resolution must have at least two name servers configured.
RHEL-09-252040V2R5RHEL 9 must configure a DNS processing mode in Network Manager.
RHEL-09-252045V2R5RHEL 9 must not have unauthorized IP tunnels configured.
RHEL-09-252050V2R5RHEL 9 must be configured to prevent unrestricted mail relaying.
RHEL-09-252065V2R5RHEL 9 libreswan package must be installed.
RHEL-09-252070V2R5There must be no shosts.equiv files on RHEL 9.
RHEL-09-252075V2R5There must be no .shosts files on RHEL 9.
RHEL-09-253010V2R5RHEL 9 must be configured to use TCP syncookies.
RHEL-09-253015V2R5RHEL 9 must ignore Internet Protocol version 4 (IPv4) Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-253020V2R5RHEL 9 must not forward Internet Protocol version 4 (IPv4) source-routed packets.
RHEL-09-253025V2R5RHEL 9 must log IPv4 packets with impossible addresses.
RHEL-09-253030V2R5RHEL 9 must log IPv4 packets with impossible addresses by default.
RHEL-09-253035V2R5RHEL 9 must use reverse path filtering on all IPv4 interfaces.
RHEL-09-253040V2R5RHEL 9 must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-253045V2R5RHEL 9 must not forward IPv4 source-routed packets by default.
RHEL-09-253050V2R5RHEL 9 must use a reverse-path filter for IPv4 network traffic when possible by default.
RHEL-09-253055V2R5RHEL 9 must not respond to Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.
RHEL-09-253060V2R5RHEL 9 must limit the number of bogus Internet Control Message Protocol (ICMP) response errors logs.
RHEL-09-253065V2R5RHEL 9 must not send Internet Control Message Protocol (ICMP) redirects.
RHEL-09-253070V2R5RHEL 9 must not allow interfaces to perform Internet Control Message Protocol (ICMP) redirects by default.
RHEL-09-253075V2R5RHEL 9 must not enable IPv4 packet forwarding unless the system is a router.
RHEL-09-254010V2R5RHEL 9 must not accept router advertisements on all IPv6 interfaces.
RHEL-09-254015V2R5RHEL 9 must ignore IPv6 Internet Control Message Protocol (ICMP) redirect messages.
RHEL-09-254020V2R5RHEL 9 must not forward IPv6 source-routed packets.
RHEL-09-254025V2R5RHEL 9 must not enable IPv6 packet forwarding unless the system is a router.
RHEL-09-254030V2R5RHEL 9 must not accept router advertisements on all IPv6 interfaces by default.
RHEL-09-254035V2R5RHEL 9 must prevent IPv6 Internet Control Message Protocol (ICMP) redirect messages from being accepted.
RHEL-09-254040V2R5RHEL 9 must not forward IPv6 source-routed packets by default.
RHEL-09-255020V2R5RHEL 9 must have the openssh-clients package installed.
RHEL-09-255105V2R5RHEL 9 SSH server configuration file must be group-owned by root.
RHEL-09-255110V2R5The RHEL 9 SSH server configuration file must be owned by root.
RHEL-09-255115V2R5RHEL 9 SSH server configuration files' permissions must not be modified.
RHEL-09-255120V2R5RHEL 9 SSH private host key files must have mode 0640 or less permissive.
RHEL-09-255125V2R5RHEL 9 SSH public host key files must have mode 0644 or less permissive.
RHEL-09-255130V2R5RHEL 9 SSH daemon must not allow compression or must only allow compression after successful authentication.
RHEL-09-255145V2R5RHEL 9 SSH daemon must not allow rhosts authentication.
RHEL-09-255150V2R5RHEL 9 SSH daemon must not allow known hosts authentication.
RHEL-09-255155V2R5RHEL 9 SSH daemon must disable remote X connections for interactive users.
RHEL-09-255160V2R5RHEL 9 SSH daemon must perform strict mode checking of home directory configuration files.
RHEL-09-255165V2R5RHEL 9 SSH daemon must display the date and time of the last successful account logon upon an SSH logon.
RHEL-09-255175V2R5RHEL 9 SSH daemon must prevent remote hosts from connecting to the proxy display.
RHEL-09-271090V2R5RHEL 9 effective dconf policy must match the policy keyfiles.
RHEL-09-271095V2R5RHEL 9 must disable the ability of a user to restart the system from the login screen.
RHEL-09-271100V2R5RHEL 9 must prevent a user from overriding the disable-restart-buttons setting for the graphical user interface.
RHEL-09-271105V2R5RHEL 9 must disable the ability of a user to accidentally press Ctrl-Alt-Del and cause a system to shut down or reboot.
RHEL-09-271110V2R5RHEL 9 must prevent a user from overriding the Ctrl-Alt-Del sequence settings for the graphical user interface.
RHEL-09-271115V2R5RHEL 9 must disable the user list at logon for graphical user interfaces.
RHEL-09-411020V2R5All RHEL 9 local interactive user accounts must be assigned a home directory upon creation.
RHEL-09-411025V2R5RHEL 9 must set the umask value to 077 for all local interactive user accounts.
RHEL-09-411035V2R5RHEL 9 system accounts must not have an interactive login shell.
RHEL-09-411055V2R5Executable search paths within the initialization files of all local interactive RHEL 9 users must only contain paths that resolve to the system default or the users home directory.
RHEL-09-411060V2R5All RHEL 9 local interactive users must have a home directory assigned in the /etc/passwd file.
RHEL-09-411065V2R5All RHEL 9 local interactive user home directories defined in the /etc/passwd file must exist.
RHEL-09-411070V2R5All RHEL 9 local interactive user home directories must be group-owned by the home directory owner's primary group.
RHEL-09-411095V2R5RHEL 9 must not have unauthorized accounts.
RHEL-09-411100V2R5The root account must be the only account having unrestricted access to RHEL 9 system.
RHEL-09-411115V2R5Local RHEL 9 initialization files must not execute world-writable programs.
RHEL-09-412075V2R5RHEL 9 must display the date and time of the last successful account logon upon logon.
RHEL-09-431025V2R5RHEL 9 must have policycoreutils package installed.
RHEL-09-431030V2R5RHEL 9 policycoreutils-python-utils package must be installed.
RHEL-09-432020V2R5RHEL 9 must use the invoking user's password for privilege escalation when using "sudo".
RHEL-09-432030V2R5RHEL 9 must restrict privilege elevation to authorized personnel.
RHEL-09-611025V2R5RHEL 9 must not allow blank or null passwords.
RHEL-09-611045V2R5RHEL 9 must ensure the password complexity module is enabled in the system-auth file.
RHEL-09-611155V2R5RHEL 9 must not have accounts configured with blank or null passwords.
RHEL-09-651020V2R5RHEL 9 must use a file integrity tool that is configured to use FIPS 140-3-approved cryptographic hashes for validating file contents and directories.
RHEL-09-651030V2R5RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).
RHEL-09-651035V2R5RHEL 9 must be configured so that the file integrity tool verifies extended attributes.
RHEL-09-652015V2R5RHEL 9 must have the packages required for encrypting offloaded audit logs installed.
RHEL-09-652020V2R5The rsyslog service on RHEL 9 must be active.
RHEL-09-652025V2R5RHEL 9 must be configured so that the rsyslog daemon does not accept log messages from other servers unless the server is being used for log aggregation.
RHEL-09-652060V2R5RHEL 9 must use cron logging.
RHEL-09-653105V2R5RHEL 9 must write audit records to disk.
WN10-00-000005V3R1Domain-joined systems must use Windows 10 Enterprise Edition 64-bit version.
WN10-00-000010V3R1Windows 10 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN10-00-000015V3R1Windows 10 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN10-00-000020V3R1Secure Boot must be enabled on Windows 10 systems.
WN10-00-000040V3R1Windows 10 systems must be maintained at a supported servicing level.
WN10-00-000045V3R1The Windows 10 system must use an anti-virus program.
WN10-00-000055V3R1Alternate operating systems must not be permitted on the same system.
WN10-00-000075V3R1Only accounts responsible for the backup operations must be members of the Backup Operators group.
WN10-00-000085V3R1Standard local user accounts must not exist on a system in a domain.
WN10-00-000130V3R1Software certificate installation files must be removed from Windows 10.
WN10-00-000135V3R1A host-based firewall must be installed and enabled on the system.
WN10-00-000140V3R1Inbound exceptions to the firewall on Windows 10 domain workstations must only allow authorized remote management hosts.
WN10-00-000190V3R1Orphaned security identifiers (SIDs) must be removed from user rights on Windows 10.
WN10-00-000230V3R1The system must notify the user when a Bluetooth device attempts to connect.
WN10-00-000240V3R1Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN10-CC-000020V3R1IPv6 source routing must be configured to highest protection.
WN10-CC-000025V3R1The system must be configured to prevent IP source routing.
WN10-CC-000030V3R1The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.
WN10-CC-000040V3R1Insecure logons to an SMB server must be disabled.
WN10-CC-000055V3R1Simultaneous connections to the internet or a Windows domain must be limited.
WN10-CC-000060V3R1Connections to non-domain networks when connected to a domain authenticated network must be blocked.
WN10-CC-000065V3R1Wi-Fi Sense must be disabled.
WN10-CC-000068V3R1Windows 10 must be configured to enable Remote host allows delegation of non-exportable credentials.
WN10-CC-000070V3R1Virtualization Based Security must be enabled on Windows 10 with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN10-CC-000075V3R1Credential Guard must be running on Windows 10 domain-joined systems.
WN10-CC-000085V3R1Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers.
WN10-CC-000090V3R1Group Policy objects must be reprocessed even if they have not changed.
WN10-CC-000115V3R1Systems must at least attempt device authentication using certificates.
WN10-CC-000170V3R1The setting to allow Microsoft accounts to be optional for modern style apps must be enabled.
WN10-CC-000195V3R1Enhanced anti-spoofing for facial recognition must be enabled on Window 10.
WN10-CC-000204V3R1If Enhanced diagnostic data is enabled it must be limited to the minimum required to support Windows Analytics.
WN10-CC-000205V3R1Windows Telemetry must not be configured to Full.
WN10-CC-000206V3R1Windows Update must not obtain updates from other PCs on the internet.
WN10-CC-000225V3R1File Explorer shell protocol must run in protected mode.
WN10-CC-000230V3R1Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for malicious websites in Microsoft Edge.
WN10-CC-000235V3R1Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for unverified files in Microsoft Edge.
WN10-CC-000238V3R1Windows 10 must be configured to prevent certificate error overrides in Microsoft Edge.
WN10-CC-000245V3R1The password manager function in the Edge browser must be disabled.
WN10-CC-000250V3R1The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.
WN10-CC-000255V3R1The use of a hardware security device with Windows Hello for Business must be enabled.
WN10-CC-000260V3R1Windows 10 must be configured to require a minimum pin length of six characters or greater.
WN10-CC-000295V3R1Attachments must be prevented from being downloaded from RSS feeds.
WN10-CC-000320V3R1Users must be notified if a web-based program attempts to install software.
WN10-SO-000015V3R1Local accounts with blank passwords must be restricted to prevent access from the network.
WN10-SO-000020V3R1The built-in administrator account must be renamed.
WN10-SO-000025V3R1The built-in guest account must be renamed.
WN10-SO-000050V3R1The computer account password must not be prevented from being reset.
WN10-SO-000055V3R1The maximum age for machine account passwords must be configured to 30 days or less.
WN10-SO-000085V3R1Caching of logon credentials must be limited.
WN10-SO-000095V3R1The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN10-SO-000140V3R1Anonymous SID/Name translation must not be allowed.
WN10-SO-000145V3R1Anonymous enumeration of SAM accounts must not be allowed.
WN10-SO-000160V3R1The system must be configured to prevent anonymous users from having the same rights as the Everyone group.
WN10-SO-000180V3R1NTLM must be prevented from falling back to a Null session.
WN10-SO-000185V3R1PKU2U authentication using online identities must be prevented.
WN10-SO-000205V3R1The LanMan authentication level must be set to send NTLMv2 response only, and to refuse LM and NTLM.
WN10-SO-000210V3R1The system must be configured to the required LDAP client signing level.
WN10-SO-000215V3R1The system must be configured to meet the minimum session security requirement for NTLM SSP based clients.
WN10-SO-000220V3R1The system must be configured to meet the minimum session security requirement for NTLM SSP based servers.
WN10-SO-000240V3R1The default permissions of global system objects must be increased.
WN10-UC-000020V3R1Zone information must be preserved when saving attachments.
WN10-CC-000050V3R1Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN10-CC-000080V3R1Virtualization-based protection of code integrity must be enabled.
WN10-00-000395V3R1Windows 10 must not have portproxy enabled or in use.
WN16-00-000010V2R9Users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN16-00-000040V2R9Administrative accounts must not be used with applications that access the Internet, such as web browsers, or with potential Internet sources, such as email.
WN16-00-000050V2R9Members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN16-00-000070V2R9Manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN16-00-000100V2R9Windows Server 2016 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN16-00-000110V2R9Systems must be maintained at a supported servicing level.
WN16-00-000120V2R9The Windows Server 2016 system must use an anti-virus program.
WN16-00-000140V2R9Servers must have a host-based intrusion detection or prevention system.
WN16-00-000270V2R9Software certificate installation files must be removed from Windows Server 2016.
WN16-00-000310V2R9A host-based firewall must be installed and enabled on the system.
WN16-00-000430V2R9FTP servers must be configured to prevent anonymous logons.
WN16-00-000440V2R9FTP servers must be configured to prevent access to the system drive.
WN16-00-000460V2R9Orphaned security identifiers (SIDs) must be removed from user rights on Windows 2016.
WN16-00-000470V2R9Secure Boot must be enabled on Windows Server 2016 systems.
WN16-00-000480V2R9Windows 2016 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN16-CC-000040V2R9Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN16-CC-000050V2R9Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN16-CC-000060V2R9Windows Server 2016 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN16-CC-000080V2R9Insecure logons to an SMB server must be disabled.
WN16-CC-000090V2R9Hardened UNC paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN16-CC-000110V2R9Windows Server 2016 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN16-CC-000140V2R9Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN16-CC-000150V2R9Group Policy objects must be reprocessed even if they have not changed.
WN16-CC-000210V2R9Users must be prompted to authenticate when the system wakes from sleep (on battery).
WN16-CC-000220V2R9Users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN16-CC-000290V2R9Windows Telemetry must be configured to Security or Basic.
WN16-CC-000350V2R9Turning off File Explorer heap termination on corruption must be disabled.
WN16-CC-000360V2R9File Explorer shell protocol must run in protected mode.
WN16-CC-000420V2R9Attachments must be prevented from being downloaded from RSS feeds.
WN16-CC-000470V2R9Users must be notified if a web-based program attempts to install software.
WN16-DC-000150V2R9Directory data (outside the root DSE) of a non-public directory must be configured to prevent anonymous access.
WN16-DC-000330V2R9Domain controllers must be configured to allow reset of machine account passwords.
WN16-DC-000430V2R9The password for the krbtgt account on a domain must be reset at least every 180 days.
WN16-MS-000050V2R9Caching of logon credentials must be limited.
WN16-MS-000120V2R9Windows Server 2016 must be running Credential Guard on domain-joined member servers.
WN16-SO-000020V2R9Local accounts with blank passwords must be restricted to prevent access from the network.
WN16-SO-000030V2R9Windows Server 2016 built-in administrator account must be renamed.
WN16-SO-000040V2R9Windows Server 2016 built-in guest account must be renamed.
WN16-SO-000120V2R9The maximum age for machine account passwords must be configured to 30 days or less.
WN16-SO-000180V2R9The Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN16-SO-000250V2R9Anonymous SID/Name translation must not be allowed.
WN16-SO-000260V2R9Anonymous enumeration of Security Account Manager (SAM) accounts must not be allowed.
WN16-SO-000290V2R9Windows Server 2016 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN16-SO-000320V2R9Services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN16-SO-000330V2R9NTLM must be prevented from falling back to a Null session.
WN16-SO-000340V2R9PKU2U authentication using online identities must be prevented.
WN16-SO-000380V2R9The LAN Manager authentication level must be set to send NTLMv2 response only and to refuse LM and NTLM.
WN16-SO-000390V2R9Windows Server 2016 must be configured to at least negotiate signing for LDAP client signing.
WN16-SO-000400V2R9Session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN16-SO-000410V2R9Session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN16-SO-000450V2R9The default permissions of global system objects must be strengthened.
WN16-UC-000030V2R9Zone information must be preserved when saving attachments.
WN22-00-000010V2R5Windows Server 2022 users with Administrative privileges must have separate accounts for administrative duties and normal operational tasks.
WN22-00-000030V2R5Windows Server 2022 administrative accounts must not be used with applications that access the internet, such as web browsers, or with potential internet sources, such as email.
WN22-00-000040V2R5Windows Server 2022 members of the Backup Operators group must have separate accounts for backup duties and normal operational tasks.
WN22-00-000060V2R5Windows Server 2022 manually managed application account passwords must be changed at least annually or when a system administrator with knowledge of the password leaves the organization.
WN22-00-000090V2R5Windows Server 2022 domain-joined systems must have a Trusted Platform Module (TPM) enabled and ready for use.
WN22-00-000100V2R5Windows Server 2022 must be maintained at a supported servicing level.
WN22-00-000110V2R5Windows Server 2022 must use an antivirus program.
WN22-00-000120V2R5Windows Server 2022 must have a host-based intrusion detection or prevention system.
WN22-00-000240V2R5Windows Server 2022 must have software certificate installation files removed.
WN22-00-000280V2R5Windows Server 2022 must have a host-based firewall installed and enabled.
WN22-00-000420V2R5Windows Server 2022 FTP servers must be configured to prevent anonymous logons.
WN22-00-000430V2R5Windows Server 2022 FTP servers must be configured to prevent access to the system drive.
WN22-00-000450V2R5Windows Server 2022 must have orphaned security identifiers (SIDs) removed from user rights.
WN22-00-000460V2R5Windows Server 2022 systems must have Unified Extensible Firmware Interface (UEFI) firmware and be configured to run in UEFI mode, not Legacy BIOS.
WN22-00-000470V2R5Windows Server 2022 must have Secure Boot enabled.
WN22-CC-000030V2R5Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.
WN22-CC-000040V2R5Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.
WN22-CC-000050V2R5Windows Server 2022 must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF)-generated routes.
WN22-CC-000070V2R5Windows Server 2022 insecure logons to an SMB server must be disabled.
WN22-CC-000080V2R5Windows Server 2022 hardened Universal Naming Convention (UNC) paths must be defined to require mutual authentication and integrity for at least the \\*\SYSVOL and \\*\NETLOGON shares.
WN22-CC-000100V2R5Windows Server 2022 must be configured to enable Remote host allows delegation of nonexportable credentials.
WN22-CC-000110V2R5Windows Server 2022 virtualization-based security must be enabled with the platform security level configured to Secure Boot or Secure Boot with DMA Protection.
WN22-CC-000130V2R5Windows Server 2022 Early Launch Antimalware, Boot-Start Driver Initialization Policy must prevent boot drivers identified as bad.
WN22-CC-000140V2R5Windows Server 2022 group policy objects must be reprocessed even if they have not changed.
WN22-CC-000180V2R5Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (on battery).
WN22-CC-000190V2R5Windows Server 2022 users must be prompted to authenticate when the system wakes from sleep (plugged in).
WN22-CC-000250V2R5Windows Server 2022 Diagnostic Data must be configured to send "required diagnostic data" or "optional diagnostic data".
WN22-CC-000260V2R5Windows Server 2022 Windows Update must not obtain updates from other PCs on the internet.
WN22-CC-000320V2R5Windows Server 2022 Turning off File Explorer heap termination on corruption must be disabled.
WN22-CC-000330V2R5Windows Server 2022 File Explorer shell protocol must run in protected mode.
WN22-CC-000390V2R5Windows Server 2022 must prevent attachments from being downloaded from RSS feeds.
WN22-CC-000440V2R5Windows Server 2022 users must be notified if a web-based program attempts to install software.
WN22-DC-000150V2R5Windows Server 2022 directory data (outside the root DSE) of a nonpublic directory must be configured to prevent anonymous access.
WN22-DC-000330V2R5Windows Server 2022 domain controllers must be configured to allow reset of machine account passwords.
WN22-DC-000430V2R5The password for the krbtgt account on a domain must be reset at least every 180 days.
WN22-MS-000050V2R5Windows Server 2022 must limit the caching of logon credentials to four or less on domain-joined member servers.
WN22-MS-000140V2R5Windows Server 2022 must be running Credential Guard on domain-joined member servers.
WN22-SO-000020V2R5Windows Server 2022 must prevent local accounts with blank passwords from being used from the network.
WN22-SO-000030V2R5Windows Server 2022 built-in administrator account must be renamed.
WN22-SO-000040V2R5Windows Server 2022 built-in guest account must be renamed.
WN22-SO-000100V2R5Windows Server 2022 maximum age for machine account passwords must be configured to 30 days or less.
WN22-SO-000150V2R5Windows Server 2022 Smart Card removal option must be configured to Force Logoff or Lock Workstation.
WN22-SO-000210V2R5Windows Server 2022 must not allow anonymous SID/Name translation.
WN22-SO-000220V2R5Windows Server 2022 must not allow anonymous enumeration of Security Account Manager (SAM) accounts.
WN22-SO-000240V2R5Windows Server 2022 must be configured to prevent anonymous users from having the same permissions as the Everyone group.
WN22-SO-000260V2R5Windows Server 2022 services using Local System that use Negotiate when reverting to NTLM authentication must use the computer identity instead of authenticating anonymously.
WN22-SO-000270V2R5Windows Server 2022 must prevent NTLM from falling back to a Null session.
WN22-SO-000280V2R5Windows Server 2022 must prevent PKU2U authentication using online identities.
WN22-SO-000310V2R5Windows Server 2022 LAN Manager authentication level must be configured to send NTLMv2 response only and to refuse LM and NTLM.
WN22-SO-000320V2R5Windows Server 2022 must be configured to at least negotiate signing for LDAP client signing.
WN22-SO-000330V2R5Windows Server 2022 session security for NTLM SSP-based clients must be configured to require NTLMv2 session security and 128-bit encryption.
WN22-SO-000340V2R5Windows Server 2022 session security for NTLM SSP-based servers must be configured to require NTLMv2 session security and 128-bit encryption.
WN22-SO-000370V2R5Windows Server 2022 default permissions of global system objects must be strengthened.
WN22-UC-000010V2R5Windows Server 2022 must preserve zone information when saving attachments.