Skip to content

StigCoverageSummary

Eric Jenkins edited this page May 31, 2024 · 31 revisions

PowerSTIG Technology Coverage : Module Version 4.22.0

A Summary of Technology Coverage for PowerSTIG is listed below, for more detailed rule coverage, follow the technology specific link:

Title: Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide
Version: 2
Release: Release: 1 Benchmark Date: 23 Jul 2021 3.2.2.36079 1.10.0
FileName: U_Adobe_Acrobat_Pro_DC_Continuous_V2R1_Manual-xccdf.xml
Created: 8/17/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 22 of 23 rules are automated; 96%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 11 of 11 rules are automated
  • Low (CAT III): 11 of 11 rules are automated

Title: Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
Version: 1
Release: Release: 6 Benchmark Date: 26 Jul 2019
FileName: U_Adobe_Acrobat_Reader_DC_Continuous_STIG_V1R6_Manual-xccdf.xml
Created: 1/21/2020
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 26 of 27 rules are automated; 96%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 16 of 16 rules are automated
  • Low (CAT III): 10 of 10 rules are automated

Title: Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide
Version: 2
Release: Release: 1 Benchmark Date: 23 Jul 2021 3.2.2.36079 1.10.0
FileName: U_Adobe_Acrobat_Reader_DC_Continuous_STIG_V2R1_Manual-xccdf.xml
Created: 8/6/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 26 of 27 rules are automated; 96%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 16 of 16 rules are automated
  • Low (CAT III): 10 of 10 rules are automated

Title: Microsoft DotNet Framework 4.0 Security Technical Implementation Guide
Version: 2
Release: Release: 3 Benchmark Date: 24 Jan 2024 3.4.1.22916 1.10.0
FileName: U_MS_DotNet_Framework_4-0_STIG_V2R3_Manual-xccdf.xml
Created: 2/16/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 6 of 18 rules are automated; 33%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 6 of 16 rules are automated
  • Low (CAT III): 0 of 2 rules are automated

Title: Microsoft DotNet Framework 4.0 Security Technical Implementation Guide
Version: 2
Release: Release: 4 Benchmark Date: 24 Apr 2024 3.4.1.22916 1.10.0
FileName: U_MS_DotNet_Framework_4-0_STIG_V2R4_Manual-xccdf.xml
Created: 5/20/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 6 of 18 rules are automated; 33%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 6 of 16 rules are automated
  • Low (CAT III): 0 of 2 rules are automated

Title: Mozilla Firefox Security Technical Implementation Guide
Version: 5
Release: Release: 2 Benchmark Date: 23 Jul 2021 3.2.2.36079 1.10.0
FileName: U_Mozilla_Firefox_STIG_V5R2_Manual-xccdf.xml
Created: 8/18/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 24 of 28 rules are automated; 86%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 23 of 26 rules are automated
  • Low (CAT III): 1 of 1 rules are automated

Title: Mozilla Firefox Security Technical Implementation Guide
Version: 6
Release: Release: 5 Benchmark Date: 26 Jul 2023 3.4.0.34222 1.10.0
FileName: U_MOZ_Firefox_STIG_V6R5_Manual-xccdf.xml
Created: 1/10/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 43 of 51 rules are automated; 84%

  • High (CAT I): 1 of 2 rules are automated
  • Medium (CAT II): 40 of 47 rules are automated
  • Low (CAT III): 2 of 2 rules are automated

Title: Google Chrome Current Windows Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 26 Jan 2023 3.4.0.34222 1.10.0
FileName: U_Google_Chrome_STIG_V2R8_Manual-xccdf.xml
Created: 9/15/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 42 of 43 rules are automated; 98%

  • High (CAT I): 1 of 1 rules are automated
  • Medium (CAT II): 40 of 41 rules are automated
  • Low (CAT III): 1 of 1 rules are automated

Title: Google Chrome Current Windows Security Technical Implementation Guide
Version: 2
Release: Release: 9 Benchmark Date: 24 Jan 2024 3.4.1.22916 1.10.0
FileName: U_Google_Chrome_STIG_V2R9_Manual-xccdf.xml
Created: 2/6/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 41 of 42 rules are automated; 98%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 40 of 41 rules are automated
  • Low (CAT III): 1 of 1 rules are automated

Title: Microsoft IIS 10.0 Server Security Technical Implementation Guide
Version: 2
Release: Release: 10 Benchmark Date: 25 Oct 2023 3.4.1.22916 1.10.0
FileName: U_MS_IIS_10-0_Server_STIG_V2R10_Manual-xccdf.xml
Created: 11/20/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 30 of 59 rules are automated; 51%

  • High (CAT I): 9 of 12 rules are automated
  • Medium (CAT II): 20 of 44 rules are automated
  • Low (CAT III): 1 of 3 rules are automated

Title: Microsoft IIS 10.0 Server Security Technical Implementation Guide
Version: 2
Release: Release: 9 Benchmark Date: 27 Apr 2023 3.4.0.34222 1.10.0
FileName: U_MS_IIS_10-0_Server_STIG_V2R9_Manual-xccdf.xml
Created: 6/14/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 31 of 60 rules are automated; 52%

  • High (CAT I): 9 of 12 rules are automated
  • Medium (CAT II): 21 of 45 rules are automated
  • Low (CAT III): 1 of 3 rules are automated

Title: Microsoft IIS 8.5 Server Security Technical Implementation Guide
Version: 2
Release: Release: 4 Benchmark Date: 27 Jul 2022 3.3.0.27375 1.10.0
FileName: U_MS_IIS_8-5_Server_STIG_V2R4_Manual-xccdf.xml
Created: 8/24/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 30 of 59 rules are automated; 51%

  • High (CAT I): 9 of 13 rules are automated
  • Medium (CAT II): 21 of 46 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft IIS 8.5 Server Security Technical Implementation Guide
Version: 2
Release: Release: 5 Benchmark Date: 26 Jan 2023 3.4.0.34222 1.10.0
FileName: U_MS_IIS_8-5_Server_STIG_V2R5_Manual-xccdf.xml
Created: 2/3/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 30 of 59 rules are automated; 51%

  • High (CAT I): 9 of 13 rules are automated
  • Medium (CAT II): 21 of 46 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft IIS 10.0 Site Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 27 Apr 2023 3.4.0.34222 1.10.0
FileName: U_MS_IIS_10-0_Site_STIG_V2R8_Manual-xccdf.xml
Created: 6/14/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 34 of 49 rules are automated; 69%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 34 of 48 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft IIS 10.0 Site Security Technical Implementation Guide
Version: 2
Release: Release: 9 Benchmark Date: 25 Oct 2023 3.4.1.22916 1.10.0
FileName: U_MS_IIS_10-0_Site_STIG_V2R9_Manual-xccdf.xml
Created: 11/20/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 34 of 49 rules are automated; 69%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 34 of 48 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft IIS 8.5 Site Security Technical Implementation Guide
Version: 2
Release: Release: 7 Benchmark Date: 26 Jan 2023 3.4.0.34222 1.10.0
FileName: U_MS_IIS_8-5_Site_STIG_V2R7_Manual-xccdf.xml
Created: 2/3/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 37 of 53 rules are automated; 70%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 37 of 52 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft IIS 8.5 Site Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 27 Apr 2023 3.4.0.34222 1.10.0
FileName: U_MS_IIS_8-5_Site_STIG_V2R8_Manual-xccdf.xml
Created: 6/14/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 37 of 53 rules are automated; 70%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 37 of 52 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Internet Explorer 11 Security Technical Implementation Guide
Version: 2
Release: Release: 2 Benchmark Date: 27 Jul 2022 3.3.0.27375 1.10.0
FileName: U_MS_IE11_STIG_V2R2_Manual-xccdf.xml
Created: 8/24/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 139 of 140 rules are automated; 99%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 136 of 136 rules are automated
  • Low (CAT III): 3 of 3 rules are automated

Title: Microsoft Internet Explorer 11 Security Technical Implementation Guide
Version: 2
Release: Release: 5 Benchmark Date: 24 Jan 2024 3.4.1.22916 1.10.0
FileName: U_MS_IE11_STIG_V2R5_Manual-xccdf.xml
Created: 2/16/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 138 of 139 rules are automated; 99%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 135 of 135 rules are automated
  • Low (CAT III): 3 of 3 rules are automated

Title: McAfee VirusScan 8.8 Local Client STIG
Version: 5
Release: Release: 16 Benchmark Date: 27 Jul 2018
FileName: U_McAfee_VirusScan88_Local_Client_STIG_V5R16_Manual-xccdf.xml
Created: 3/24/2020
Description: The McAfee VirusScan 8.8 Local Client STIG is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 55 of 95 rules are automated; 58%

  • High (CAT I): 2 of 3 rules are automated
  • Medium (CAT II): 53 of 92 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Edge Security Technical Implementation Guide
Version: 1
Release: Release: 7 Benchmark Date: 26 Jul 2023 3.4.0.34222 1.10.0
FileName: U_MS_Edge_V1R7_STIG_Manual-xccdf.xml
Created: 8/28/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 51 of 56 rules are automated; 91%

  • High (CAT I): 1 of 2 rules are automated
  • Medium (CAT II): 44 of 44 rules are automated
  • Low (CAT III): 6 of 10 rules are automated

Title: Microsoft Edge Security Technical Implementation Guide
Version: 1
Release: Release: 8 Benchmark Date: 24 Apr 2024 3.4.1.22916 1.10.0
FileName: U_MS_Edge_V1R8_STIG_Manual-xccdf.xml
Created: 5/30/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 54 of 59 rules are automated; 92%

  • High (CAT I): 1 of 2 rules are automated
  • Medium (CAT II): 47 of 47 rules are automated
  • Low (CAT III): 6 of 10 rules are automated

Title: Microsoft Office 365 ProPlus Security Technical Implementation Guide
Version: 2
Release: Release: 11 Benchmark Date: 25 Oct 2023 3.4.1.22916 1.10.0
FileName: U_MS_Office_365_ProPlus_STIG_V2R11_Manual-xccdf.xml
Created: 11/16/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 129 of 142 rules are automated; 91%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 129 of 142 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Office 365 ProPlus Security Technical Implementation Guide
Version: 2
Release: Release: 12 Benchmark Date: 24 Apr 2024 3.4.1.22916 1.10.0
FileName: U_MS_Office_365_ProPlus_STIG_V2R12_Manual-xccdf.xml
Created: 5/20/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 129 of 142 rules are automated; 91%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 129 of 142 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Access 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 1 Benchmark Date: 14 Nov 2016
FileName: U_Microsoft_Access_2016_STIG_V1R1_Manual-xccdf.xml
Created: 1/10/2024
Description: The Microsoft Access 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 16 of 16 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 16 of 16 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Excel 2013 STIG
Version: 1
Release: Release: 7 Benchmark Date: 27 Apr 2018
FileName: U_MS_Excel_2013_STIG_V1R7_Manual-xccdf.xml
Created: 10/11/2022
Description: The Microsoft Excel 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 48 of 48 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 47 of 47 rules are automated
  • Low (CAT III): 1 of 1 rules are automated

Title: Microsoft Excel 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 2 Benchmark Date: 27 Oct 2017
FileName: U_MS_Excel_2016_STIG_V1R2_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft Excel 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 42 of 42 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 42 of 42 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft OneNote 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 2 Benchmark Date: 19 Jan 2017
FileName: U_Microsoft_OneNote_2016_STIG_V1R2_Manual-xccdf.xml
Created: 1/10/2024
Description: The Microsoft OneNote 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 10 of 10 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 10 of 10 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Outlook 2013 STIG
Version: 1
Release: Release: 12 Benchmark Date: 27 Apr 2018
FileName: U_MicrosoftOutlook2013_STIG_V1R12_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft Outlook 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 82 of 82 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 82 of 82 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Outlook 2013 STIG
Version: 1
Release: Release: 13 Benchmark Date: 26 Oct 2018
FileName: U_MicrosoftOutlook2013_STIG_V1R13_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft Outlook 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 82 of 82 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 82 of 82 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Outlook 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 2 Benchmark Date: 15 Dec 2021 3.2.2.36079 1.10.0
FileName: U_MS_Outlook_2016_STIG_V2R2_Manual-xccdf.xml
Created: 1/11/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 63 of 63 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 63 of 63 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Outlook 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 3 Benchmark Date: 27 Apr 2022 3.3.0.27375 1.10.0
FileName: U_MS_Outlook_2016_STIG_V2R3_Manual-xccdf.xml
Created: 6/6/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 63 of 63 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 63 of 63 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft PowerPoint 2013 STIG
Version: 1
Release: Release: 6 Benchmark Date: 27 Apr 2018
FileName: U_MS_PowerPoint_2013_V1R6_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft PowerPoint 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 41 of 41 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 41 of 41 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft PowerPoint 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 1 Benchmark Date: 14 Nov 2016
FileName: U_Microsoft_PowerPoint_2016_STIG_V1R1_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft PowerPoint 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 38 of 38 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 38 of 38 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Publisher 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 3 Benchmark Date: 27 Apr 2018
FileName: U_MS_Publisher_2016_STIG_V1R3_Manual-xccdf.xml
Created: 7/19/2022
Description: The Microsoft Publisher 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 15 of 15 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 15 of 15 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Skype for Business 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 1 Benchmark Date: 14 Nov 2016
FileName: U_Microsoft_Skype_for_Business_2016_STIG_V1R1_Manual-xccdf.xml
Created: 1/10/2024
Description: The Microsoft Skype for Business 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 3 of 3 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 3 of 3 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Office System 2013 STIG
Version: 1
Release: Release: 9 Benchmark Date: 25 Oct 2019
FileName: U_MS_OfficeSystem_2013_STIG_V1R9_Manual-xccdf.xml
Created: 12/4/2019
Description: The Microsoft Office System 2013 STIG is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the NIST 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 52 of 52 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 52 of 52 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Office System 2013 Security Technical Implementation Guide
Version: 2
Release: Release: 1 Benchmark Date: 23 Oct 2020 3.1.1.36225 1.10.0
FileName: U_MS_OfficeSystem_2013_STIG_V2R1_Manual-xccdf.xml
Created: 12/3/2020
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 52 of 52 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 52 of 52 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Office System 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 2 Benchmark Date: 27 Jan 2022 3.2.2.36079 1.10.0
FileName: U_Microsoft_Office_System_2016_STIG_V2R2_Manual-xccdf.xml
Created: 2/25/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 22 of 22 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 22 of 22 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Office System 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 3 Benchmark Date: 24 Apr 2024 3.4.1.22916 1.10.0
FileName: U_MS_Office_System_2016_STIG_V2R3_Manual-xccdf.xml
Created: 5/20/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 22 of 22 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 22 of 22 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Visio 2013 STIG
Version: 1
Release: Release: 4 Benchmark Date: 27 Apr 2018
FileName: U_MS_Visio_2013_STIG_V1R4_Manual-xccdf.xml
Created: 5/28/2020
Description: The Microsoft Visio 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 13 of 13 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 13 of 13 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Word 2013 STIG
Version: 1
Release: Release: 6 Benchmark Date: 27 Apr 2018
FileName: U_MS_Word_2013_STIG_V1R6_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft Word 2013 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 36 of 36 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 36 of 36 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Word 2016 Security Technical Implementation Guide
Version: 1
Release: Release: 1 Benchmark Date: 14 Nov 2016
FileName: U_Microsoft_Word_2016_STIG_V1R1_Manual-xccdf.xml
Created: 9/6/2019
Description: The Microsoft Word 2016 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 35 of 35 rules are automated; 100%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 35 of 35 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Java Runtime Environment (JRE) version 8 STIG for Windows
Version: 1
Release: Release: 5 Benchmark Date: 26 Jan 2018
FileName: U_Oracle_JRE_8_Windows_STIG_V1R5_Manual-xccdf.xml
Created: 11/21/2019
Description: The Java Runtime Environment (JRE) is a bundle developed and offered by Oracle Corporation which includes the Java Virtual Machine (JVM), class libraries, and other components necessary to run Java applications and applets. Certain default settings within the JRE pose a security risk so it is necessary to deploy system wide properties to ensure a higher degree of security when utilizing the JRE.
Total Stig Rule Coverage: 20 of 26 rules are automated; 77%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 18 of 23 rules are automated
  • Low (CAT III): 2 of 2 rules are automated

Title: Oracle Java Runtime Environment (JRE) Version 8 for Windows Security Technical Implementation Guide
Version: 2
Release: Release: 1 Benchmark Date: 22 Jan 2021 3.2.1.41666 1.10.0
FileName: U_Oracle_JRE_8_Windows_STIG_V2R1_Manual-xccdf.xml
Created: 2/3/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 20 of 26 rules are automated; 77%

  • High (CAT I): 0 of 1 rules are automated
  • Medium (CAT II): 18 of 23 rules are automated
  • Low (CAT III): 2 of 2 rules are automated

Title: Red Hat Enterprise Linux 7 Security Technical Implementation Guide
Version: 3
Release: Release: 13 Benchmark Date: 25 Oct 2023 3.4.1.22916 1.10.0
FileName: U_RHEL_7_STIG_V3R13_Manual-xccdf.xml
Created: 12/11/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 166 of 275 rules are automated; 60%

  • High (CAT I): 10 of 26 rules are automated
  • Medium (CAT II): 153 of 236 rules are automated
  • Low (CAT III): 3 of 13 rules are automated

Title: Red Hat Enterprise Linux 7 Security Technical Implementation Guide
Version: 3
Release: Release: 14 Benchmark Date: 24 Jan 2024 3.4.1.22916 1.10.0
FileName: U_RHEL_7_STIG_V3R14_Manual-xccdf.xml
Created: 2/5/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 166 of 275 rules are automated; 60%

  • High (CAT I): 10 of 26 rules are automated
  • Medium (CAT II): 153 of 236 rules are automated
  • Low (CAT III): 3 of 13 rules are automated

Title: Microsoft SQL Server 2012 Security Technical Implementation Guide
Version: 1
Release: Release: 19 Benchmark Date: 26 Jul 2019
FileName: U_MS_SQL_Server_2012_Database_STIG_V1R19_Manual-xccdf.xml
Created: 8/12/2021
Description: The Microsoft SQL Server 2012 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 2 of 28 rules are automated; 7%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 2 of 27 rules are automated
  • Low (CAT III): 0 of 1 rules are automated

Title: Microsoft SQL Server Database 2012 Security Technical Implementation Guide
Version: 1
Release: Release: 20 Benchmark Date: 16 Jan 2020
FileName: U_MS_SQL_Server_2012_Database_STIG_V1R20_Manual-xccdf.xml
Created: 8/12/2021
Description: The Microsoft SQL Server 2012 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 2 of 28 rules are automated; 7%

  • High (CAT I): 0 of 0 rules are automated
  • Medium (CAT II): 2 of 27 rules are automated
  • Low (CAT III): 0 of 1 rules are automated

Title: Microsoft SQL Server 2012 Security Technical Implementation Guide
Version: 1
Release: Release: 19 Benchmark Date: 26 Jul 2019
FileName: U_MS_SQL_Server_2012_Instance_STIG_V1R19_Manual-xccdf.xml
Created: 8/12/2021
Description: The Microsoft SQL Server 2012 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 52 of 153 rules are automated; 34%

  • High (CAT I): 0 of 6 rules are automated
  • Medium (CAT II): 51 of 138 rules are automated
  • Low (CAT III): 1 of 9 rules are automated

Title: Microsoft SQL Server Instance 2012 Security Technical Implementation Guide
Version: 1
Release: Release: 20 Benchmark Date: 16 Jan 2020
FileName: U_MS_SQL_Server_Instance_2012_V1R20_Manual-xccdf.xml
Created: 8/12/2021
Description: The Microsoft SQL Server 2012 Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: [email protected].
Total Stig Rule Coverage: 52 of 153 rules are automated; 34%

  • High (CAT I): 0 of 6 rules are automated
  • Medium (CAT II): 51 of 138 rules are automated
  • Low (CAT III): 1 of 9 rules are automated

Title: MS SQL Server 2016 Instance Security Technical Implementation Guide
Version: 2
Release: Release: 11 Benchmark Date: 24 Jan 2024 3.4.1.22916 1.10.0
FileName: U_MS_SQL_Server_2016_Instance_STIG_V2R11_Manual-xccdf.xml
Created: 2/6/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 67 of 125 rules are automated; 54%

  • High (CAT I): 26 of 34 rules are automated
  • Medium (CAT II): 41 of 89 rules are automated
  • Low (CAT III): 0 of 2 rules are automated

Title: MS SQL Server 2016 Instance Security Technical Implementation Guide
Version: 2
Release: Release: 12 Benchmark Date: 24 Apr 2024 3.4.1.22916 1.10.0
FileName: U_MS_SQL_Server_2016_Instance_STIG_V2R12_Manual-xccdf.xml
Created: 5/20/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 67 of 125 rules are automated; 54%

  • High (CAT I): 26 of 34 rules are automated
  • Medium (CAT II): 41 of 89 rules are automated
  • Low (CAT III): 0 of 2 rules are automated

Title: Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
Version: 2
Release: Release: 13 Benchmark Date: 24 Jan 2024 3.4.1.22916 1.10.0
FileName: U_CAN_Ubuntu_18-04_LTS_STIG_V2R13_Manual-xccdf.xml
Created: 2/6/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 126 of 208 rules are automated; 61%

  • High (CAT I): 8 of 17 rules are automated
  • Medium (CAT II): 102 of 165 rules are automated
  • Low (CAT III): 16 of 26 rules are automated

Title: Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide
Version: 2
Release: Release: 14 Benchmark Date: 24 Apr 2024 3.4.1.22916 1.10.0
FileName: U_CAN_Ubuntu_18-04_LTS_STIG_V2R14_Manual-xccdf.xml
Created: 5/20/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 126 of 208 rules are automated; 61%

  • High (CAT I): 8 of 17 rules are automated
  • Medium (CAT II): 102 of 165 rules are automated
  • Low (CAT III): 16 of 26 rules are automated

Title: VMware vSphere 6.5 ESXi Security Technical Implementation Guide
Version: 2
Release: Release: 2 Benchmark Date: 23 Jul 2021 3.2.2.36079 1.10.0
FileName: U_VMW_vSphere_6-5_ESXi_STIG_V2R2_Manual-xccdf.xml
Created: 7/29/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 32 of 76 rules are automated; 42%

  • High (CAT I): 3 of 7 rules are automated
  • Medium (CAT II): 24 of 50 rules are automated
  • Low (CAT III): 5 of 19 rules are automated

Title: VMware vSphere 6.5 ESXi Security Technical Implementation Guide
Version: 2
Release: Release: 3 Benchmark Date: 27 Oct 2021 3.2.2.36079 1.10.0
FileName: U_VMW_vSphere_6-5_ESXi_STIG_V2R3_Manual-xccdf.xml
Created: 11/3/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 32 of 77 rules are automated; 42%

  • High (CAT I): 3 of 7 rules are automated
  • Medium (CAT II): 24 of 51 rules are automated
  • Low (CAT III): 5 of 19 rules are automated

Title: Microsoft Windows 10 Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_10_STIG_V2R8_Manual-xccdf.xml
Created: 11/17/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 246 of 278 rules are automated; 88%

  • High (CAT I): 23 of 27 rules are automated
  • Medium (CAT II): 205 of 230 rules are automated
  • Low (CAT III): 18 of 21 rules are automated

Title: Microsoft Windows 10 Security Technical Implementation Guide
Version: 2
Release: Release: 9 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_10_STIG_V2R9_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 246 of 278 rules are automated; 88%

  • High (CAT I): 26 of 31 rules are automated
  • Medium (CAT II): 202 of 226 rules are automated
  • Low (CAT III): 18 of 21 rules are automated

Title: Microsoft Windows 11 Security Technical Implementation Guide
Version: 1
Release: Release: 5 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_11_STIG_V1R5_Manual-xccdf.xml
Created: 11/17/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 238 of 275 rules are automated; 87%

  • High (CAT I): 21 of 26 rules are automated
  • Medium (CAT II): 202 of 231 rules are automated
  • Low (CAT III): 15 of 18 rules are automated

Title: Microsoft Windows 11 Security Technical Implementation Guide
Version: 1
Release: Release: 6 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_11_STIG_V1R6_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 238 of 275 rules are automated; 87%

  • High (CAT I): 23 of 29 rules are automated
  • Medium (CAT II): 200 of 228 rules are automated
  • Low (CAT III): 15 of 18 rules are automated

Title: Microsoft Windows Defender Antivirus Security Technical Implementation Guide
Version: 2
Release: Release: 3 Benchmark Date: 01 Nov 2021 3.2.2.36079 1.10.0
FileName: U_MS_Windows_Defender_Antivirus_STIG_V2R3_Manual-xccdf.xml
Created: 11/23/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 41 of 41 rules are automated; 100%

  • High (CAT I): 4 of 4 rules are automated
  • Medium (CAT II): 37 of 37 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Defender Antivirus Security Technical Implementation Guide
Version: 2
Release: Release: 4 Benchmark Date: 31 May 2022 3.3.0.27375 1.10.0
FileName: U_MS_Windows_Defender_Antivirus_STIG_V2R4_Manual-xccdf.xml
Created: 6/6/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 41 of 41 rules are automated; 100%

  • High (CAT I): 4 of 4 rules are automated
  • Medium (CAT II): 37 of 37 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Windows 2012 Server Domain Name System Security Technical Implementation Guide
Version: 2
Release: Release: 4 Benchmark Date: 01 Nov 2021 3.2.2.36079 1.10.0
FileName: U_MS_Windows_2012_Server_DNS_STIG_V2R4_Manual-xccdf.xml
Created: 11/23/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 13 of 84 rules are automated; 15%

  • High (CAT I): 0 of 3 rules are automated
  • Medium (CAT II): 13 of 81 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Windows 2012 Server Domain Name System Security Technical Implementation Guide
Version: 2
Release: Release: 5 Benchmark Date: 31 May 2022 3.3.0.27375 1.10.0
FileName: U_MS_Windows_2012_Server_DNS_STIG_V2R5_Manual-xccdf.xml
Created: 6/6/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 13 of 84 rules are automated; 15%

  • High (CAT I): 0 of 3 rules are automated
  • Medium (CAT II): 13 of 81 rules are automated
  • Low (CAT III): 0 of 0 rules are automated

Title: Microsoft Windows Firewall with Advanced Security Security Technical Implementation Guide
Version: 2
Release: Release: 1 Benchmark Date: 01 Nov 2021 3.2.2.36079 1.10.0
FileName: U_MS_Windows_Firewall_STIG_V2R1_Manual-xccdf.xml
Created: 11/23/2021
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 38 of 39 rules are automated; 97%

  • High (CAT I): 6 of 6 rules are automated
  • Medium (CAT II): 14 of 15 rules are automated
  • Low (CAT III): 18 of 18 rules are automated

Title: Microsoft Windows Defender Firewall with Advanced Security Security Technical Implementation Guide
Version: 2
Release: Release: 2 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Firewall_STIG_V2R2_Manual-xccdf.xml
Created: 11/20/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 38 of 39 rules are automated; 97%

  • High (CAT I): 6 of 6 rules are automated
  • Medium (CAT II): 14 of 15 rules are automated
  • Low (CAT III): 18 of 18 rules are automated

Title: Microsoft Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide
Version: 3
Release: Release: 3 Benchmark Date: 01 Nov 2021 3.2.2.36079 1.10.0
FileName: U_MS_Windows_2012_and_2012_R2_DC_STIG_V3R3_Manual-xccdf.xml
Created: 6/27/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 328 of 392 rules are automated; 84%

  • High (CAT I): 29 of 41 rules are automated
  • Medium (CAT II): 245 of 287 rules are automated
  • Low (CAT III): 54 of 64 rules are automated

Title: Microsoft Windows Server 2012/2012 R2 Domain Controller Security Technical Implementation Guide
Version: 3
Release: Release: 4 Benchmark Date: 31 May 2022 3.3.0.27375 1.10.0
FileName: U_MS_Windows_2012_and_2012_R2_DC_STIG_V3R4_Manual-xccdf.xml
Created: 6/27/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 327 of 391 rules are automated; 84%

  • High (CAT I): 29 of 41 rules are automated
  • Medium (CAT II): 244 of 286 rules are automated
  • Low (CAT III): 54 of 64 rules are automated

Title: Microsoft Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide
Version: 3
Release: Release: 3 Benchmark Date: 01 Nov 2021 3.2.2.36079 1.10.0
FileName: U_MS_Windows_2012_and_2012_R2_MS_STIG_V3R3_Manual-xccdf.xml
Created: 6/27/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 305 of 347 rules are automated; 88%

  • High (CAT I): 28 of 33 rules are automated
  • Medium (CAT II): 225 of 254 rules are automated
  • Low (CAT III): 52 of 60 rules are automated

Title: Microsoft Windows Server 2012/2012 R2 Member Server Security Technical Implementation Guide
Version: 3
Release: Release: 4 Benchmark Date: 31 May 2022 3.3.0.27375 1.10.0
FileName: U_MS_Windows_2012_and_2012_R2_MS_STIG_V3R4_Manual-xccdf.xml
Created: 6/27/2022
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 304 of 346 rules are automated; 88%

  • High (CAT I): 28 of 33 rules are automated
  • Medium (CAT II): 224 of 253 rules are automated
  • Low (CAT III): 52 of 60 rules are automated

Title: Microsoft Windows Server 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 7 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2016_DC_STIG_V2R7_Manual-xccdf.xml
Created: 12/22/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 213 of 267 rules are automated; 80%

  • High (CAT I): 20 of 31 rules are automated
  • Medium (CAT II): 185 of 223 rules are automated
  • Low (CAT III): 8 of 13 rules are automated

Title: Microsoft Windows Server 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2016_DC_STIG_V2R8_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 214 of 268 rules are automated; 80%

  • High (CAT I): 20 of 32 rules are automated
  • Medium (CAT II): 186 of 223 rules are automated
  • Low (CAT III): 8 of 13 rules are automated

Title: Microsoft Windows Server 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 7 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2016_MS_STIG_V2R7_Manual-xccdf.xml
Created: 12/22/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 205 of 239 rules are automated; 86%

  • High (CAT I): 20 of 24 rules are automated
  • Medium (CAT II): 177 of 203 rules are automated
  • Low (CAT III): 8 of 12 rules are automated

Title: Microsoft Windows Server 2016 Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2016_MS_STIG_V2R8_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 206 of 240 rules are automated; 86%

  • High (CAT I): 20 of 25 rules are automated
  • Medium (CAT II): 178 of 203 rules are automated
  • Low (CAT III): 8 of 12 rules are automated

Title: Microsoft Windows Server 2019 Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2019_DC_STIG_V2R8_Manual-xccdf.xml
Created: 12/22/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 217 of 269 rules are automated; 81%

  • High (CAT I): 21 of 31 rules are automated
  • Medium (CAT II): 187 of 224 rules are automated
  • Low (CAT III): 9 of 14 rules are automated

Title: Microsoft Windows Server 2019 Security Technical Implementation Guide
Version: 2
Release: Release: 9 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2019_DC_STIG_V2R9_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 217 of 269 rules are automated; 81%

  • High (CAT I): 21 of 32 rules are automated
  • Medium (CAT II): 187 of 223 rules are automated
  • Low (CAT III): 9 of 14 rules are automated

Title: Microsoft Windows Server 2019 Security Technical Implementation Guide
Version: 2
Release: Release: 8 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2019_MS_STIG_V2R8_Manual-xccdf.xml
Created: 12/22/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 209 of 241 rules are automated; 87%

  • High (CAT I): 21 of 24 rules are automated
  • Medium (CAT II): 179 of 204 rules are automated
  • Low (CAT III): 9 of 13 rules are automated

Title: Microsoft Windows Server 2019 Security Technical Implementation Guide
Version: 2
Release: Release: 9 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2019_MS_STIG_V2R9_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 209 of 241 rules are automated; 87%

  • High (CAT I): 21 of 25 rules are automated
  • Medium (CAT II): 179 of 203 rules are automated
  • Low (CAT III): 9 of 13 rules are automated

Title: Microsoft Windows Server 2022 Security Technical Implementation Guide
Version: 1
Release: Release: 4 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2022_DC_STIG_V1R4_Manual-xccdf.xml
Created: 12/22/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 216 of 267 rules are automated; 81%

  • High (CAT I): 20 of 28 rules are automated
  • Medium (CAT II): 187 of 227 rules are automated
  • Low (CAT III): 9 of 12 rules are automated

Title: Microsoft Windows Server 2022 Security Technical Implementation Guide
Version: 1
Release: Release: 5 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2022_DC_STIG_V1R5_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 216 of 267 rules are automated; 81%

  • High (CAT I): 20 of 29 rules are automated
  • Medium (CAT II): 187 of 226 rules are automated
  • Low (CAT III): 9 of 12 rules are automated

Title: Microsoft Windows Server 2022 Security Technical Implementation Guide
Version: 1
Release: Release: 4 Benchmark Date: 09 Nov 2023 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2022_MS_STIG_V1R4_Manual-xccdf.xml
Created: 12/22/2023
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 207 of 239 rules are automated; 87%

  • High (CAT I): 19 of 21 rules are automated
  • Medium (CAT II): 179 of 207 rules are automated
  • Low (CAT III): 9 of 11 rules are automated

Title: Microsoft Windows Server 2022 Security Technical Implementation Guide
Version: 1
Release: Release: 5 Benchmark Date: 15 May 2024 3.4.1.22916 1.10.0
FileName: U_MS_Windows_Server_2022_MS_STIG_V1R5_Manual-xccdf.xml
Created: 5/4/2024
Description: This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: [email protected].
Total Stig Rule Coverage: 207 of 239 rules are automated; 87%

  • High (CAT I): 19 of 22 rules are automated
  • Medium (CAT II): 179 of 206 rules are automated
  • Low (CAT III): 9 of 11 rules are automated

PowerStig

Clone this wiki locally