SRG-OS-000480-GPOS-00227
The operating system must be configured in accordance with the security configuration settings based on DoD security configuration or implementation guidance, including STIGs, NSA configuration guides, CTOs, and DTMs.
27 rules found Severity: Medium

15 rules found Severity: High

17 rules found Severity: Medium

17 rules found Severity: Medium

23 rules found Severity: Medium

19 rules found Severity: Medium

18 rules found Severity: Medium

18 rules found Severity: Medium

18 rules found Severity: Medium

26 rules found Severity: Medium

20 rules found Severity: Medium

27 rules found Severity: Medium

23 rules found Severity: Medium

26 rules found Severity: Medium

29 rules found Severity: Medium

28 rules found Severity: Medium

29 rules found Severity: Medium

29 rules found Severity: Medium

28 rules found Severity: Medium

28 rules found Severity: Medium

27 rules found Severity: Medium

27 rules found Severity: Medium

27 rules found Severity: Medium

30 rules found Severity: Medium

30 rules found Severity: Medium

19 rules found Severity: Medium

12 rules found Severity: Medium

1 rule found Severity: Medium
