Are you over 18 and want to see adult content?
More Annotations
A complete backup of https://bhcc.edu
Are you over 18 and want to see adult content?
A complete backup of https://upc-cablecom.ch
Are you over 18 and want to see adult content?
A complete backup of https://pure360.fr
Are you over 18 and want to see adult content?
A complete backup of https://boxesandarrows.com
Are you over 18 and want to see adult content?
A complete backup of https://unicef.dk
Are you over 18 and want to see adult content?
A complete backup of https://flipout.co.uk
Are you over 18 and want to see adult content?
A complete backup of https://aftaeatspos.com
Are you over 18 and want to see adult content?
A complete backup of https://filmfestival-rathausplatz.at
Are you over 18 and want to see adult content?
A complete backup of https://apple.nl
Are you over 18 and want to see adult content?
A complete backup of https://oikura.jp
Are you over 18 and want to see adult content?
A complete backup of https://evolutecno.com
Are you over 18 and want to see adult content?
A complete backup of https://kfornow.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of https://museuegipci.com
Are you over 18 and want to see adult content?
A complete backup of https://primetv.co.nz
Are you over 18 and want to see adult content?
A complete backup of https://domzamkad.ru
Are you over 18 and want to see adult content?
A complete backup of https://miracle-ear.mobi
Are you over 18 and want to see adult content?
A complete backup of https://oikos-group.it
Are you over 18 and want to see adult content?
A complete backup of https://klafs.com
Are you over 18 and want to see adult content?
A complete backup of https://losangelesclippersjerseys.com
Are you over 18 and want to see adult content?
A complete backup of https://barakapower.com
Are you over 18 and want to see adult content?
A complete backup of https://shopautocare.com
Are you over 18 and want to see adult content?
A complete backup of https://icatcare.org
Are you over 18 and want to see adult content?
A complete backup of https://352area.com
Are you over 18 and want to see adult content?
A complete backup of https://viagratrio.com
Are you over 18 and want to see adult content?
Text
STIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
SAFE BROWSING MUST BE ENABLED, Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding. 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\GoogleChrome\Safe
SI-2 - STIG VIEWER
SI-2 (1) Central Management. HIGH. Central management is the organization-wide management and implementation of flaw remediation processes. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw remediation security controls. COMPLETE 8500 CONTROL LIST Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com WINDOWS 10 SHOULD BE CONFIGURED TO PREVENT USERS FROM Check Text ( C-98413r1_chk ) If the following registry value does not exist or is not configured as specified, this is a finding. If the following registry value does not exist or is not configured as specified, this is a finding: POWERSHELL TRANSCRIPTION MUST BE ENABLED ON WINDOWS 10. Value: 1. Fix Text (F-32522r569299_fix) Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access.SC-28 - STIG VIEWER
SC-28 (1) Cryptographic Protection. Selection of cryptographic mechanisms is based on the need to protect the confidentiality and integrity of organizational information. The strength of mechanism is commensurate with the security category and/or classification of the information. This control enhancement applies to significantconcentrations
AU-3 - STIG VIEWER
AU-3 (1) Additional Audit Information. MODERATE. Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitlyneeded
THE RUNNING OF OUTDATED PLUGINS MUST BE DISABLED. 1. In the omnibox (address bar) type chrome://policy. 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome. CLIENT COMPUTERS MUST BE REQUIRED TO AUTHENTICATE FOR RPC Registry Path: \Software\Policies\Microsoft\Windows NT\Rpc\. Value Name: EnableAuthEpResolution. Type: REG_DWORD. Value: 1. Fix Text (F-45915r1_fix) Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Enable RPC Endpoint Mapper Client Authentication" to "Enabled.STIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
SAFE BROWSING MUST BE ENABLED, Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding. 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\GoogleChrome\Safe
SI-2 - STIG VIEWER
SI-2 (1) Central Management. HIGH. Central management is the organization-wide management and implementation of flaw remediation processes. Central management includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed flaw remediation security controls. COMPLETE 8500 CONTROL LIST Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com WINDOWS 10 SHOULD BE CONFIGURED TO PREVENT USERS FROM Check Text ( C-98413r1_chk ) If the following registry value does not exist or is not configured as specified, this is a finding. If the following registry value does not exist or is not configured as specified, this is a finding: POWERSHELL TRANSCRIPTION MUST BE ENABLED ON WINDOWS 10. Value: 1. Fix Text (F-32522r569299_fix) Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access.SC-28 - STIG VIEWER
SC-28 (1) Cryptographic Protection. Selection of cryptographic mechanisms is based on the need to protect the confidentiality and integrity of organizational information. The strength of mechanism is commensurate with the security category and/or classification of the information. This control enhancement applies to significantconcentrations
AU-3 - STIG VIEWER
AU-3 (1) Additional Audit Information. MODERATE. Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitlyneeded
THE RUNNING OF OUTDATED PLUGINS MUST BE DISABLED. 1. In the omnibox (address bar) type chrome://policy. 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome. CLIENT COMPUTERS MUST BE REQUIRED TO AUTHENTICATE FOR RPC Registry Path: \Software\Policies\Microsoft\Windows NT\Rpc\. Value Name: EnableAuthEpResolution. Type: REG_DWORD. Value: 1. Fix Text (F-45915r1_fix) Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Enable RPC Endpoint Mapper Client Authentication" to "Enabled.STIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
CP-4 - STIG VIEWER
CP-4a. Tests the contingency plan for the information system Assignment: organization-defined frequency using Assignment: organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan; CP-4b. Reviews the contingency plan test results; and. CP-4c. Initiates correctiveactions, if needed.
IA-2 - STIG VIEWER
IA-2. Identification And Authentication (organizational Users) LOW. P1. Identification And Authentication. Instructions. The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). Guidance. Organizational users include employees or individuals thatorganizations
THE RUNNING OF OUTDATED PLUGINS MUST BE DISABLED. 1. In the omnibox (address bar) type chrome://policy. 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome.AU-3 - STIG VIEWER
AU-3 (1) Additional Audit Information. MODERATE. Detailed information that organizations may consider in audit records includes, for example, full text recording of privileged commands or the individual identities of group account users. Organizations consider limiting the additional audit information to only that information explicitlyneeded
GOOGLE CHROME CURRENT WINDOWS SECURITY TECHNICAL Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com TEST AND DEVELOPMENT ZONE B SECURITY TECHNICAL V-39636. High. The test and development infrastructure must use a firewall for traffic inspection to and from DoD operational networks. A firewall is necessary to inspect traffic as it flows into and out of the test and development environment. Without a firewall present, traffic could flow freely between the operational network POWERSHELL SCRIPT BLOCK LOGGING MUST BE ENABLED ON WINDOWS 10. Details. If the following registry value does not exist or is not configured as specified, this is a finding. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled". THE IMPERSONATE A CLIENT AFTER AUTHENTICATION USER RIGHT Description; Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Impersonate a client after authentication" user right allows a program to impersonate another user or account to run on their behalf. ACCOUNTS MUST BE CONFIGURED TO REQUIRE PASSWORD EXPIRATION. Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com SAFE BROWSING MUST BE ENABLED, Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding. 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\GoogleChrome\Safe
THE APPLICATION POOL FOR EACH IIS 10.0 WEBSITE MUST HAVE A Open the IIS 10.0 Manager. Perform the following for each Application Pool: Click "Application Pools". Highlight an Application Pool and click "Advanced Settings" in the "Action" Pane. Scroll down to the "Recycling" section and expand the "Generate Recycle Event Log Entry" section. Verify both the "Regular time interval" and "Specific time WINDOWS 10 SHOULD BE CONFIGURED TO PREVENT USERS FROM Check Text ( C-98413r1_chk ) If the following registry value does not exist or is not configured as specified, this is a finding. If the following registry value does not exist or is not configured as specified, this is a finding: POWERSHELL TRANSCRIPTION MUST BE ENABLED ON WINDOWS 10. Value: 1. Fix Text (F-32522r569299_fix) Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access. COMPLETE 8500 CONTROL LIST Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com THE RUNNING OF OUTDATED PLUGINS MUST BE DISABLED. 1. In the omnibox (address bar) type chrome://policy. 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome.AC-6 - STIG VIEWER
AC-6 (7) (a) Reviews Assignment: organization-defined frequency the privileges assigned to Assignment: organization-defined roles or classes of users to validate the need for such privileges; and. AC-6 (7) (b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs. COMMAND LINE DATA MUST BE INCLUDED IN PROCESS CREATION EVENTS. Enabling "Include command line data for process creation events" will record the command line information with the process creation events in the log. This can provide additional detail when malware has run on a system. STIG. Date. Windows Server 2016 Security Technical Implementation Guide. 2017-11-20. SEND ALL SIGNED MESSAGES AS CLEAR SIGNED MESSAGES MUST BE Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com CLIENT COMPUTERS MUST BE REQUIRED TO AUTHENTICATE FOR RPC Registry Path: \Software\Policies\Microsoft\Windows NT\Rpc\. Value Name: EnableAuthEpResolution. Type: REG_DWORD. Value: 1. Fix Text (F-45915r1_fix) Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Enable RPC Endpoint Mapper Client Authentication" to "Enabled. SAFE BROWSING MUST BE ENABLED, Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding. 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\GoogleChrome\Safe
THE APPLICATION POOL FOR EACH IIS 10.0 WEBSITE MUST HAVE A Open the IIS 10.0 Manager. Perform the following for each Application Pool: Click "Application Pools". Highlight an Application Pool and click "Advanced Settings" in the "Action" Pane. Scroll down to the "Recycling" section and expand the "Generate Recycle Event Log Entry" section. Verify both the "Regular time interval" and "Specific time WINDOWS 10 SHOULD BE CONFIGURED TO PREVENT USERS FROM Check Text ( C-98413r1_chk ) If the following registry value does not exist or is not configured as specified, this is a finding. If the following registry value does not exist or is not configured as specified, this is a finding: POWERSHELL TRANSCRIPTION MUST BE ENABLED ON WINDOWS 10. Value: 1. Fix Text (F-32522r569299_fix) Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access. COMPLETE 8500 CONTROL LIST Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com THE RUNNING OF OUTDATED PLUGINS MUST BE DISABLED. 1. In the omnibox (address bar) type chrome://policy. 2. If AllowOutdatedPlugins is not displayed under the Policy Name column or it is not set to false under the Policy Name column, then this is a finding. Windows method: 1. Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome.AC-6 - STIG VIEWER
AC-6 (7) (a) Reviews Assignment: organization-defined frequency the privileges assigned to Assignment: organization-defined roles or classes of users to validate the need for such privileges; and. AC-6 (7) (b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs. COMMAND LINE DATA MUST BE INCLUDED IN PROCESS CREATION EVENTS. Enabling "Include command line data for process creation events" will record the command line information with the process creation events in the log. This can provide additional detail when malware has run on a system. STIG. Date. Windows Server 2016 Security Technical Implementation Guide. 2017-11-20. SEND ALL SIGNED MESSAGES AS CLEAR SIGNED MESSAGES MUST BE Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com CLIENT COMPUTERS MUST BE REQUIRED TO AUTHENTICATE FOR RPC Registry Path: \Software\Policies\Microsoft\Windows NT\Rpc\. Value Name: EnableAuthEpResolution. Type: REG_DWORD. Value: 1. Fix Text (F-45915r1_fix) Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Enable RPC Endpoint Mapper Client Authentication" to "Enabled.STIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
AC-6 - STIG VIEWER
AC-6 (7) (a) Reviews Assignment: organization-defined frequency the privileges assigned to Assignment: organization-defined roles or classes of users to validate the need for such privileges; and. AC-6 (7) (b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs.AC-17 - STIG VIEWER
AC-17 (1) Automated Monitoring / Control. MODERATE. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstationsAU-9 - STIG VIEWER
AU-9 (1) Hardware Write-Once Media. This control enhancement applies to the initial generation of audit trails (i.e., the collection of audit records that represents the audit information to be used for detection, analysis, and reporting purposes) and to the backup of those audit trails. The enhancement does not apply to the initialgeneration
IA-2 - STIG VIEWER
IA-2. Identification And Authentication (organizational Users) LOW. P1. Identification And Authentication. Instructions. The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users). Guidance. Organizational users include employees or individuals thatorganizations
TEST AND DEVELOPMENT ZONE B SECURITY TECHNICAL V-39636. High. The test and development infrastructure must use a firewall for traffic inspection to and from DoD operational networks. A firewall is necessary to inspect traffic as it flows into and out of the test and development environment. Without a firewall present, traffic could flow freely between the operational network POWERSHELL SCRIPT BLOCK LOGGING MUST BE ENABLED ON WINDOWS 10. Details. If the following registry value does not exist or is not configured as specified, this is a finding. Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Script Block Logging" to "Enabled". THE IMPERSONATE A CLIENT AFTER AUTHENTICATION USER RIGHT Description; Inappropriate granting of user rights can provide system, administrative, and other high-level capabilities. The "Impersonate a client after authentication" user right allows a program to impersonate another user or account to run on their behalf. THE SERVER MESSAGE BLOCK (SMB) V1 PROTOCOL MUST BE Description; SMBv1 is a legacy protocol that uses the MD5 algorithm as part of SMB. MD5 is known to be vulnerable to a number of attacks such as collision and preimage attacks as well as not being FIPS compliant. ACCOUNTS MUST BE CONFIGURED TO REQUIRE PASSWORD EXPIRATION. Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.comSTIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
POWERSHELL TRANSCRIPTION MUST BE ENABLED ON WINDOWS 10. Value: 1. Fix Text (F-32522r569299_fix) Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access. SAFE BROWSING MUST BE ENABLED, Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding. 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\GoogleChrome\Safe
WINDOWS 10 SHOULD BE CONFIGURED TO PREVENT USERS FROM Check Text ( C-98413r1_chk ) If the following registry value does not exist or is not configured as specified, this is a finding. If the following registry value does not exist or is not configured as specified, this is a finding:SC-7 - STIG VIEWER
SC-7 (7) Prevent Split Tunneling For Remote Devices. MODERATE. This control enhancement is implemented within remote devices (e.g., notebook computers) through configuration settings to disable split tunneling in those devices, and by preventing those configuration settings from being readily configurable by users.AC-6 - STIG VIEWER
AC-6 (7) (a) Reviews Assignment: organization-defined frequency the privileges assigned to Assignment: organization-defined roles or classes of users to validate the need for such privileges; and. AC-6 (7) (b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs. MS SQL SERVER 2016 INSTANCE SECURITY TECHNICAL Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com COMMAND LINE DATA MUST BE INCLUDED IN PROCESS CREATION EVENTS. Enabling "Include command line data for process creation events" will record the command line information with the process creation events in the log. This can provide additional detail when malware has run on a system. STIG. Date. Windows Server 2016 Security Technical Implementation Guide. 2017-11-20. A DEDICATED MANAGEMENT VLAN OR VLANS MUST BE CONFIGURED TO Description; All ports, including the internal sc0 interface, are configured by default to be members of VLAN 1. In a VLAN-based network, switches use VLAN 1 as the default VLAN for in-band management and to communicate with other networking devices using Spanning-Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and ACCOUNTS MUST BE CONFIGURED TO REQUIRE PASSWORD EXPIRATION. Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.comSTIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
POWERSHELL TRANSCRIPTION MUST BE ENABLED ON WINDOWS 10. Value: 1. Fix Text (F-32522r569299_fix) Configure the policy value for Computer Configuration >> Administrative Templates >> Windows Components >> Windows PowerShell >> "Turn on PowerShell Transcription" to "Enabled". Specify the Transcript output directory to point to a Central Log Server or another secure location to prevent user access. SAFE BROWSING MUST BE ENABLED, Start regedit. 2. Navigate to HKLM\Software\Policies\Google\Chrome\. 3. If the SafeBrowsingEnabled value name does not exist or its value data is not set to 1, then this is a finding. 1. Open the “group policy editor” tool with gpedit.msc. 2. Navigate to Policy Path: Computer Configuration\Administrative Templates\Google\GoogleChrome\Safe
WINDOWS 10 SHOULD BE CONFIGURED TO PREVENT USERS FROM Check Text ( C-98413r1_chk ) If the following registry value does not exist or is not configured as specified, this is a finding. If the following registry value does not exist or is not configured as specified, this is a finding:SC-7 - STIG VIEWER
SC-7 (7) Prevent Split Tunneling For Remote Devices. MODERATE. This control enhancement is implemented within remote devices (e.g., notebook computers) through configuration settings to disable split tunneling in those devices, and by preventing those configuration settings from being readily configurable by users.AC-6 - STIG VIEWER
AC-6 (7) (a) Reviews Assignment: organization-defined frequency the privileges assigned to Assignment: organization-defined roles or classes of users to validate the need for such privileges; and. AC-6 (7) (b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs. MS SQL SERVER 2016 INSTANCE SECURITY TECHNICAL Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com COMMAND LINE DATA MUST BE INCLUDED IN PROCESS CREATION EVENTS. Enabling "Include command line data for process creation events" will record the command line information with the process creation events in the log. This can provide additional detail when malware has run on a system. STIG. Date. Windows Server 2016 Security Technical Implementation Guide. 2017-11-20. A DEDICATED MANAGEMENT VLAN OR VLANS MUST BE CONFIGURED TO Description; All ports, including the internal sc0 interface, are configured by default to be members of VLAN 1. In a VLAN-based network, switches use VLAN 1 as the default VLAN for in-band management and to communicate with other networking devices using Spanning-Tree Protocol (STP), Cisco Discovery Protocol (CDP), Dynamic Trunking Protocol (DTP), VLAN Trunking Protocol (VTP), and ACCOUNTS MUST BE CONFIGURED TO REQUIRE PASSWORD EXPIRATION. Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.comSTIG VIEWER
Latest STIGs. Release Date. Title. Version. 2021-01-05. IBM z/OS RACF Security Technical Implementation Guide. 8. 2020-12-31. VMware vSphere6.5 ESXi
CM-6 - STIG VIEWER
CM-6 (1) Automated Central Management / Application / Verification. HIGH. The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for Assignment: organization-defined information system components. CM-6CM-3 - STIG VIEWER
CM-3 (1) (d) Prohibit changes to the information system until designated approvals are received; CM-3 (1) (e) Document all changes to the information system; and. CM-3 (1) (f) Notify Assignment: organization-defined personnel when approved changes to the information system are completed. CM-3 (2) Test / Validate / DocumentChanges.
AC-17 - STIG VIEWER
AC-17 (1) Automated Monitoring / Control. MODERATE. Automated monitoring and control of remote access sessions allows organizations to detect cyber attacks and also ensure ongoing compliance with remote access policies by auditing connection activities of remote users on a variety of information system components (e.g., servers, workstationsAC-4 - STIG VIEWER
AC-4 (9) Human Reviews. Organizations define security policy filters for all situations where automated flow control decisions are possible. When a fully automated flow control decision is not possible, then a human review may be employed in lieu of, or as a complement to, automated security policy filtering. MS SQL SERVER 2016 INSTANCE SECURITY TECHNICAL Contact. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. PHONE 702.776.9898 FAX 866.924.3791 info@unifiedcompliance.com MICROSOFT EXCEL 2016 SECURITY TECHNICAL IMPLEMENTATION GUIDE The Microsoft Excel 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil. THE APPLICATION MUST ENFORCE A 60-DAY MAXIMUM PASSWORD Review user password settings and validate the application is configured to expire and force a password change after 60 days. If user passwords are not configured to expire after 60 days, or if the application does not have the ability to control this setting, this is a finding. Fix Text (F-75749r1_fix) Configure the application to havea
REMOTE ACCESS FEATURE MUST BE DISABLED, UNLESS Description; Information systems are capable of providing a wide variety of functions and services. Some of the functions and services, provided by default, may not be necessary to support essential organizational operations (e.g., key missions, functions). CLIENT COMPUTERS MUST BE REQUIRED TO AUTHENTICATE FOR RPC Registry Path: \Software\Policies\Microsoft\Windows NT\Rpc\. Value Name: EnableAuthEpResolution. Type: REG_DWORD. Value: 1. Fix Text (F-45915r1_fix) Configure the policy value for Computer Configuration -> Administrative Templates -> System -> Remote Procedure Call -> "Enable RPC Endpoint Mapper Client Authentication" to "Enabled.Search for: Submit
* Home
* STIGs
* DoD 8500
* NIST 800-53
* Common Controls Hub* About
Search for: Submit
The Common Controls Hub is a new, interactive comparison and build tool. Check it out for free!TRY IT
------------------------- Standardizes and unifies compliance terms.TRY IT
-------------------------LATEST STIGS
RELEASE DATE
TITLE
VERSION
2020-04-16
Microsoft Office 365 ProPlus Security Technical ImplementationGuide
1
2020-04-04
Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide1
2020-04-01
Oracle Database 12c Security Technical Implementation Guide1
2020-03-31
SLES 12 Security Technical Implementation Guide1
2020-03-30
IBM z/OS TSS Security Technical Implementation Guide7
2020-03-30
IBM z/OS RACF Security Technical Implementation Guide7
2020-03-30
Network Device Management Security Requirements Guide3
2020-03-30
IBM z/OS ACF2 Security Technical Implementation Guide7
2020-03-27
VMware vSphere 6.5 vCenter Server for Windows Security Technical Implementation Guide1
2020-03-27
IIS 8.5 Server Security Technical Implementation Guide1
2020-03-27
Citrix XenDesktop 7.x Delivery Controller Security Technical Implementation Guide1
2020-03-27
IIS 8.5 Site Security Technical Implementation Guide1
2020-03-27
McAfee Application Control 8.x Security Technical ImplementationGuide
1
2020-03-27
VMware vSphere 6.5 ESXi Security Technical Implementation Guide1
2020-03-27
Symantec ProxySG ALG Security Technical Implementation Guide1
2020-03-25
Oracle Linux 6 Security Technical Implementation Guide1
2020-03-24
Microsoft IIS 10.0 Site Security Technical Implementation Guide1
2020-03-24
Apple OS X 10.13 Security Technical Implementation Guide1
2020-03-24
Application Server Security Requirements Guide2
2020-03-24
Windows 10 Security Technical Implementation Guide1
NOTE
The content contained within this site is taken from the publicly available, UNCLASSIFIED DISA STIG 'zip' archive. When a
new archive is released each quarter, the site will be updated. ------------------------- SUBSCRIBE TO OUR MAILING LIST Sign-up to receive email updates about the STIGViewer service:Email Address
Scope, Define, and Maintain Regulatory Demands Online in Minutes.READ MORE
CONTACT
10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145PHONE 702.776.9898
FAX 866.924.3791
info@unifiedcompliance.comQUICK LINKS
* Home
* Company
* Products
* Partners
* Peer Review
* Contact
* Support
* Legal
_Stay connected with UCF_ TwitterAll right reserved.
_Stay connected with UCF_Twitter Facebook
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0