Ensure All Accounts on the System Have Unique User IDs
Ensure All Groups on the System Have Unique Group ID
All GIDs referenced in /etc/passwd must be defined in /etc/group
Ensure Insecure File Locking is Not Allowed
Ensure no duplicate UIDs exist
The A10 Networks ADC must not have any shared accounts (other than the emergency administration account).
The A10 Networks ADC must not use the default admin account.
The A10 Networks ADC must not use the default enable password.
AAA Services must be configured to uniquely identify and authenticate organizational users.
Security identifiers (SIDs) must be configured to use only authentication data of directly trusted external or forest trust.
The ALG providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.
The ALG providing user authentication intermediary services must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The ALG providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s).
The application server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
The application must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
All BlackBerry UEM server local accounts created during application installation and configuration must be disabled or removed.
The BlackBerry Enterprise Mobility Server (BEMS) must be configured to use Windows Authentication for the database connection.
If the Mail service (Push Notifications support for BlackBerry Work) is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to use Windows Authentication for the database connection.
If the Mail service (Push Notifications support for BlackBerry Work) is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to use Windows Integrated Authentication for the Exchange connection.
If the BlackBerry Connect service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to use Windows Authentication for the database connection.
If the BlackBerry Docs service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to use Windows Authentication for the database connection.
If the BlackBerry Docs service is installed on the BlackBerry Enterprise Mobility Server (BEMS), it must be configured to use NTLM authentication.
The CA API Gateway providing user authentication intermediary services must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The CA API Gateway providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) that validate user account access authorizations and privileges.
The CA API Gateway providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s).
The IDMS environment must require sign-on for users and restrict them to only authorized functions.
The Central Log Server must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
LDAP integration in Docker Enterprise must be configured.
If user authentication services are provided, CounterACT must be configured with a pre-established trust relationship and mechanisms with a central directory service that validates user account access authorizations and privileges.
If user authentication services are provided, CounterACT must restrict user authentication traffic to specific authentication server(s).
The storage system must only be operated in conjunction with an LDAP server in a trusted environment if an Active Directory server is not available.
The storage system must only be operated in conjunction with an Active Directory server in a trusted environment if an LDAP server is not available.
IBM Aspera Console must be configured with a preestablished trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.
IBM Aspera Faspex must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
IBM Aspera Shares must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The IBM Aspera High-Speed Transfer Server must restrict the transfer user(s) to the "aspshell".
The DataPower Gateway providing user authentication intermediary services must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The DataPower Gateway providing user access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate user account access authorizations and privileges.
The DataPower Gateway providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s).
The MQ Appliance messaging server must use an enterprise user management system to uniquely identify and authenticate users (or processes acting on behalf of organizational users).
The WebSphere Liberty Server must use an LDAP user registry.
Basic Authentication must be disabled.
The MQ Appliance network device must uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
The WebSphere Application Server LDAP user registry must be used.
The WebSphere Application Server local file-based user registry must not be used.
CA VM:Secure product NORULE record in the SECURITY CONFIG file must be configured to REJECT.
MobileIron Sentry, for PKI-based authentication, must be configured to map validated certificates to unique user accounts.
The JBoss Server must be configured to utilize a centralized authentication mechanism such as AD or LDAP.
ISEC7 EMM Suite must disable or delete local account created during application installation and configuration.
The Sentry providing mobile device access control intermediary services must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or AAA server) which validate mobile device account access authorizations and privileges.
The Sentry providing mobile device authentication intermediary services must restrict mobile device authentication traffic to specific authentication server(s).
All Jamf Pro EMM server local accounts created during application installation and configuration must be disabled.
The Juniper SRX Services Gateway VPN must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The Mainframe Product must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
Azure SQL Database must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
ONTAP must be configured to use an authentication server to provide multifactor authentication.
The network device, for PKI-based authentication, must be configured to map validated certificates to unique user accounts.
Nutanix AOS must use an enterprise user management system to uniquely identify and authenticate users.
Oracle WebLogic must uniquely identify and authenticate users (or processes acting on behalf of users).
All Prisma Cloud Compute users must have a unique, individual account.
Prisma Cloud Compute Console must run as nonroot user (uid 2674).
The Riverbed NetProfiler must be configured to authenticate each administrator prior to authorizing privileges based on roles.
Splunk Enterprise must use organization level authentication to uniquely identify and authenticate users.
Splunk Enterprise must have all local user accounts removed after implementing organizational level user management system, except for one emergency account of last resort.
Symantec ProxySG must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
Symantec ProxySG must be configured with a pre-established trust relationship and mechanisms with appropriate authorities that validate user account access authorizations and privileges.
Symantec ProxySG providing user authentication intermediary services must restrict user authentication traffic to specific authentication servers.
Common Access Card (CAC)-based authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
Multifactor authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
Multi-factor authentication must be enabled and enforced on the Tanium Server for all access and all accounts.
The UEM server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The NSX-T Manager must integrate with either VMware Identity Manager (vIDM) or VMware Workspace ONE Access.
All Workspace ONE UEM server local accounts created during application installation and configuration must be disabled or removed.
The VPN Gateway must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
DCAF Console access must require a password to be entered by each user.
Tomcat management applications must use LDAP realm authentication.
Apple iOS/iPadOS 16 must implement the management setting: use SSL for Exchange ActiveSync.
Apple iOS/iPadOS 16 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 16 Mail app.
Apple iOS/iPadOS 17 must implement the management setting: use SSL for Exchange ActiveSync.
Apple iOS/iPadOS 17 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 17 Mail app.
The macOS system must disable logon to other user's active and locked sessions.
The macOS system must disable root logon.
The macOS system must configure login window to prompt for username and password.
The Ubuntu operating system must uniquely identify interactive users.
PostgreSQL must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The Cisco ASA remote access VPN server must be configured to identify and authenticate users before granting access to the network.
The container platform must uniquely identify and authenticate users.
The container platform application program interface (API) must uniquely identify and authenticate users.
The container platform must uniquely identify and authenticate processes acting on behalf of the users.
The container platform application program interface (API) must uniquely identify and authenticate processes acting on behalf of the users.
The EDB Postgres Advanced Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
IBM z/OS Certificate Name Filtering must be implemented with appropriate authorization and documentation.
The operating system must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users).
The HPE 3PAR OS must be configured for centralized account management functions via LDAP.
The HPE 3PAR OS must provide automated mechanisms for supporting account management functions via AD.
All accounts on AIX system must have unique account names.
All accounts on AIX must be assigned unique User Identification Numbers (UIDs) and must authenticate organizational and non-organizational users (or processes acting on behalf of these users).
The AIX SYSTEM attribute must not be set to NONE for any account.
IBM z/OS Started Tasks must be properly identified and defined to ACF2.
IBM z/OS UID(0) must be properly assigned.
IBM z/OS user account for the UNIX kernel (OMVS) must be properly defined to the security database.
IBM z/OS user account for the UNIX (RMFGAT) must be properly defined.
ACF2 LOGONIDs must be defined with the required fields completed.
CA-ACF2 defined user accounts must uniquely identify system users.
IBM z/OS must have Certificate Name Filtering implemented with appropriate authorization and documentation.
IBM z/OS FTP Server daemon must be defined with proper security parameters.
IBM z/OS Syslog daemon must be started at z/OS initialization.
IBM z/OS Syslog daemon must be properly defined and secured.
IBM z/OS Started tasks for the Base TCP/IP component must be defined in accordance with security requirements.
IBM z/OS user account for the z/OS UNIX SUPERSUSER userid must be properly defined.
IBM z/OS UNIX user accounts must be properly defined.
IBM z/OS UNIX groups must be defined with a unique GID.
IBM z/OS Attributes of z/OS UNIX user accounts must have a unique GID in the range of 1-99.
IBM z/OS Attributes of UNIX user accounts used for account modeling must be defined in accordance with security requirements.
IBM Integrated Crypto Service Facility (ICSF) Started Task name must be properly identified / defined to the system ACP.
Certificate Name Filtering must be implemented with appropriate authorization and documentation.
The CA-TSS CPFRCVUND Control Option value specified must be set to NO.
The CA-TSS CPFTARGET Control Option value specified must be set to LOCAL.
CA-TSS User ACIDs and Control ACIDs must have the NAME field completed.
The CA-TSS PASSWORD(NOPW) option must not be specified for any ACID type.
Interactive ACIDs defined to CA-TSS must have the required fields completed.
CA-TSS Batch ACID(s) submitted through RJE and NJE must be sourced.
IBM z/OS DASD management ACIDs must be properly defined to CA-TSS.
The IBM z/OS FTP server daemon must be defined with proper security parameters.
IBM RACF users must have the required default fields.
IBM interactive USERIDs defined to RACF must have the required fields completed.
IBM z/OS Started Tasks must be properly identified and defined to RACF.
The IBM RACF Automatic Data Set Protection (ADSP) SETROPTS value must be set to NOADSP.
IBM RACF user accounts must uniquely identify system users.
The IBM z/OS Syslog daemon must not be started at z/OS initialization.
The IBM z/OS Syslog daemon must be properly defined and secured.
IBM z/OS started tasks for the Base TCP/IP component must be defined in accordance with security requirements.
The IBM z/OS Syslog daemon must be started at z/OS initialization.
The IBM z/OS user account for the UNIX kernel (OMVS) must be properly defined to the security database.
The IBM z/OS user account for the z/OS UNIX SUPERUSER userid must be properly defined.
The IBM z/OS user account for the UNIX (RMFGAT) must be properly defined.
IBM z/OS attributes of UNIX user accounts used for account modeling must be defined in accordance with security requirements.
IBM z/OS attributes of z/OS UNIX user accounts must have a unique GID in the range of 1-99.
IBM Integrated Crypto Service Facility (ICSF) Started Task name is not properly identified / defined to the system ACP.
IBM Integrated Crypto Service Facility (ICSF) Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
The ICS must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
IBM Integrated Crypto Service Facility (ICSF) Started task(s) must be properly defined to the STARTED resource class for RACF.
The ICS must be configured to prevent nonprivileged users from executing privileged functions.
MarkLogic Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
MariaDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
MongoDB must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The built-in administrator account must be disabled.
Shared user accounts must not be permitted on the system.
Outdated or unused accounts must be removed from the system or disabled.
Windows Server 2016 accounts must require passwords.
Windows Server 2019 shared user accounts must not be permitted.
Windows Server 2019 accounts must require passwords.
Windows Server 2022 shared user accounts must not be permitted.
Windows Server 2022 accounts must require passwords.
The DBMS must ensure users are authenticated with an individual authenticator prior to using a group authenticator.
The DBMS must ensure users are authenticated with an individual authenticator prior to using a shared authenticator.
The Oracle Linux operating system must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users) using multifactor authentication.
The Oracle Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.
OL 8 duplicate User IDs (UIDs) must not exist for interactive users.
The MySQL Database Server 8.0 must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The Palo Alto Networks security platform must uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
The Palo Alto Networks security platform must not use the default admin account password.
Automation Controller must be configured to use an enterprise user management system.
Redis Enterprise DBMS must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
OpenShift RBAC access controls must be enforced.
OpenShift must disable root and terminate network connections.
The Red Hat Enterprise Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.
RHEL 8 duplicate User IDs (UIDs) must not exist for interactive users.
The SUSE operating system must not have duplicate User IDs (UIDs) for interactive users.
RHEL 9 duplicate User IDs (UIDs) must not exist for interactive users.
All RHEL 9 interactive users must have a primary group that exists.
RHEL 9 groups must have unique Group ID (GID).
RHEL 9 must use the CAC smart card driver.
Duplicate User IDs (UIDs) must not exist for users within the organization.
Splunk Enterprise must use organization-level authentication to uniquely identify and authenticate users.
The VMM must uniquely identify and must authenticate organizational users (or processes acting on behalf of organizational users).
The ESXi host must use Active Directory for local user authentication.
ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.
Active Directory ESX Admin group membership must not be used when adding ESXi hosts to Active Directory.
The vCenter Server must uniquely identify and authenticate users or processes acting on behalf of users.
The ESXi host must uniquely identify and must authenticate organizational users by using Active Directory.
The Photon operating system must not have duplicate User IDs (UIDs).
VMware Postgres must require authentication on all connections.
BMC CONTROL-D Started Task name is not properly identified / defined to the system ACP.
BMC CONTROL-O Started Task name is not properly identified / defined to the system ACP.
BMC IOA Started Task name must be properly identified and defined to the system ACP.
BMC Mainview for z/OS Started Task name must be properly identified and/or defined to the system ACP.
CA Common Services Started Task name will be properly identified and/or defined to the system ACP.
CA VTAPE Started Task name is not properly identified/defined to the system ACP.
BMC CONTROL-M Started Task name is not properly identified / defined to the system ACP.
BMC CONTROL-M Started task(s) must be properly defined to the STARTED resource class for RACF.
The vCenter PostgreSQL service must require authentication on all connections.
CA 1 Tape Management Started Task name will be properly identified and/or defined to the system ACP.
CA MIM Resource Sharing Started Task name will be properly identified and/or defined to the system ACP.
BMC CONTROL-D Started task(s) must be properly defined to the STARTED resource class for RACF.
CL/SuperSession Started Task name is not properly identified / defined to the system ACP.
Compuware Abend-AID Started Task name will be properly identified and/or defined to the system ACP.
IBM CSSMTP Started Task name is not properly identified and/or defined to the system ACP.
CICS region logonid(s) must be defined and/or controlled in accordance with the security requirements.
CICS default logonid(s) must be defined and/or controlled in accordance with the security requirements.
BMC CONTROL-O Started task(s) must be properly defined to the STARTED resource class for RACF.
BMC IOA Started task(s) must be properly defined to the STARTED resource class for RACF.
BMC Mainview for z/OS Started Task name is not properly identified and/or defined to the system ACP.
BMC Mainview for z/OS Started task(s) must be properly defined to the STARTED resource class for RACF.
CA 1 Tape Management Started task will be properly defined to the STARTED resource class for RACF.
IBM System Display and Search Facility (SDSF) Started Task name will be properly identified and/or defined to the system ACP.
CA MIM Resource Sharing Started task will be properly defined to the STARTED resource class for RACF.
CA VTAPE Started task(s) must be properly defined to the STARTED resource class for RACF.
Quest NC-Pass Started Task name will be properly identified and/or defined to the system ACP.
Tivoli Asset Discovery for z/OS (TADz) Started Task name(s) must be properly identified / defined to the system ACP.
IBM CSSMTP Started task(s) must be properly defined to the STARTED resource class for RACF.
WebSphere MQ started tasks are not defined in accordance with the proper security requirements.
WebSphere MQ dead letter and alias dead letter queues are not properly defined.
BMC CONTROL-D Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
IBM Health Checker Started Task name will be properly identified and/or defined to the system ACP.
CA Common Services Started task will be properly defined to the STARTED resource class for RACF.
NetView Started Task name must be properly identified / defined to the system ACP.
CL/SuperSession Started task(s) must be properly defined to the STARTED resource class for RACF.
Compuware Abend-AID Started task will be properly defined to the STARTED resource class for RACF.
ROSCOE Started Task name is not properly identified / defined to the system ACP.
CICS region logonid(s) must be defined and/or controlled in accordance with the security requirements.
BMC CONTROL-M Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
BMC CONTROL-M is not properly defined to the Facility Matrix Table for Top Secret.
BMC IOA Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
BMC IOA is not properly defined to the Facility Matrix Table for Top Secret.
IBM Tivoli Asset Discovery for zOS (TADz) Started task(s) must be properly defined to the STARTED resource class for RACF.
CA 1 Tape Management Started task will be properly defined to the Started Task Table ACID for Top Secret.
CA 1 Tape Management will be properly defined to the Facility Matrix Table.
CA Common Services Started task will be properly defined to the Started Task Table ACID for Top Secret.
BMC CONTROL-D is not properly defined to the Facility Matrix Table for Top Secret.
IBM Health Checker Started task will be properly defined to the STARTED resource class for RACF.
IBM System Display and Search Facility (SDSF) Started task will be properly defined to the STARTED resource class for RACF.
BMC CONTROL-O Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
BMC CONTROL-O is not properly defined to the Facility Matrix Table for Top Secret.
NetView Started Task name(s) is not properly identified / defined to the system ACP.
IBM Tivoli NetView Started task(s) must be properly defined to the STARTED resource class for RACF.
Quest NC-Pass Started task will be properly defined to the STARTED resource class for RACF.
BMC Mainview for z/OS Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
BMC Mainview for z/OS is not properly defined to the Facility Matrix Table for Top Secret.
CA MIM Resource Sharing Started task will be properly defined to the Started Task Table for Top Secret.
CA VTAPE Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
CL/SuperSession Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
CL/SuperSession is not properly defined to the Facility Matrix Table for Top Secret.
Compuware Abend-AID Started task will be properly defined to the Started Task Table for Top Secret.
IBM CSSMTP Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
ROSCOE Started task(s) must be properly defined to the STARTED resource class for RACF.
IBM Health Checker Started task will be properly defined to the Started Task Table for Top Secret.
The BIG-IP APM module must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.
The BIG-IP APM module must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.
The BIG-IP APM module must restrict user authentication traffic to specific authentication server(s) when providing user authentication to virtual servers.
IBM System Display and Search Facility (SDSF) Started task will be properly defined to the Started Task Table ACID for Top Secret.
NetView Started Task name(s) is not properly identified / defined to the system ACP.
IBM Tivoli NetView Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
NetView is not properly defined to the Facility Matrix Table for Top Secret.
Quest NC-Pass Started task will be properly defined to the Started Task Table ACID for Top Secret.
Quest NC-Pass will be properly defined to the Facility Matrix Table.
IBM Tivoli Asset Discovery for zOS (TADz) Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
The BIG-IP appliance must be configured to uniquely identify and authenticate organizational administrators (or processes acting on behalf of organizational administrators).
The BIG-IP Core implementation must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users) when connecting to virtual servers.
The BIG-IP Core implementation must be configured with a pre-established trust relationship and mechanisms with appropriate authorities (e.g., Active Directory or authentication, authorization, and accounting (AAA) server) that validate user account access authorizations and privileges when providing access control to virtual servers.
The BIG-IP Core implementation providing user authentication intermediary services must restrict user authentication traffic to specific authentication server(s) when providing access control to virtual servers.
ROSCOE Started task(s) must be properly defined to the Started Task Table ACID for Top Secret.
ROSCOE is not properly defined to the Facility Matrix Table for Top Secret.
The macOS system must disable login to other users' active and locked sessions.
The macOS system must disable root login.
The macOS system must disable unattended or automatic login to the system.
The macOS system must configure the login window to prompt for username and password.
Ubuntu 22.04 LTS must uniquely identify interactive users.
The cloud service offering (CSO) must be configured to use DOD public key infrastructure (PKI) to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The Enterprise Voice, Video, and Messaging Endpoint must be configured to uniquely identify participating users.
The F5 BIG-IP appliance providing user authentication intermediary services must uniquely identify and authenticate users using redundant authentication servers and multifactor authentication (MFA).
The Enterprise Voice, Video, and Messaging Session Manager must be configured to uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).
The Enterprise Voice, Video, and Messaging Session Manager must be configured to use an organizational-level user account management system.
The F5 BIG-IP appliance must be configured to use multifactor authentication (MFA) for interactive logins.
Started tasks for zSecure products must be properly defined.
ISEC7 SPHERE must disable or delete local account created during application installation and configuration.
Sentry, for PKI-based authentication, must be configured to map validated certificates to unique user accounts.
MKE must not permit users to create pods that share host process namespace.
RHEL 9 must use the common access card (CAC) smart card driver.
SLEM 5 must not have duplicate User IDs (UIDs) for interactive users.
TOSS duplicate User IDs (UIDs) must not exist for interactive users.
Vendor-supplied user accounts for the WebSphere Application Server must be defined to the ACP.
Apple iOS/iPadOS 18 must implement the management setting: use SSL for Exchange ActiveSync.
Apple iOS/iPadOS 18 must implement the management setting: not allow messages in an ActiveSync Exchange account to be forwarded or moved to other accounts in the Apple iOS/iPadOS 18 Mail app.