You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+16-2
Original file line number
Diff line number
Diff line change
@@ -72,18 +72,31 @@ For detailed information, please see the [StigData Wiki](https://github.com/Micr
72
72
73
73
PowerStig.DSC is not really a specific module, but rather a collection of PowerShell Desired State Configuration (DSC) composite resources to manage the configurable items in each STIG.
74
74
Each composite uses [PowerStig.Data](#powerstigdata) classes to retrieve PowerStig XML.
75
-
This allows the PowerStig.Data classes to manage exceptions, Org settings, and skipped rules uniformly across all composite resources. The standard DSC ResourceID's can them be used by additional automation to automatically generate compliance reports or trigger other automation solutions.
75
+
This allows the PowerStig.Data classes to manage exceptions, Org settings, and skipped rules uniformly across all composite resources. The standard DSC ResourceID's can then be used by additional automation to automatically generate compliance reports or trigger other automation solutions.
76
76
77
77
### Composite Resources
78
78
79
79
The list of STIGs that we are currently covering.
80
80
81
81
|Name|Description|
82
82
| ---- | --- |
83
-
|[Browser](https://github.com/Microsoft/PowerStig/wiki/Browser)| Provides a mechanism to manage Browser STIG settings. |
83
+
|[Adobe](https://github.com/Microsoft/PowerStig/wiki/Adobe)| Provides a mechanism to manage Adobe STIG settings.|
84
+
|[Chrome](https://github.com/Microsoft/PowerStig/wiki/Chrome)| Provides a mechanism to manage Google Chrome STIG settings.|
84
85
|[DotNetFramework](https://github.com/Microsoft/PowerStig/wiki/DotNetFramework)| Provides a mechanism to manage .Net Framework STIG settings. |
86
+
|[Edge](https://github.com/Microsoft/PowerStig/wiki/Edge)| Provides a mechanism to manage Microsoft Edge STIG settings. |
87
+
|[Firefox](https://github.com/Microsoft/PowerStig/wiki/Firefox)| Provides a mechanism to manage Firefox STIG settings. |
88
+
|[IisServer](https://github.com/Microsoft/PowerStig/wiki/IisServer)| Provides a mechanism to manage IIS Server settings. |
89
+
|[IisSite](https://github.com/Microsoft/PowerStig/wiki/IisSite)| Provides a mechanism to manage IIS Site settings. |
90
+
|[InternetExplorer](https://github.com/Microsoft/PowerStig/wiki/InternetExplorer)| Provides a mechanism to manage Microsoft Internet Explorer settings. |
91
+
|[McAfee](https://github.com/Microsoft/PowerStig/wiki/McAfee)| Provides a mechanism to manage McAfee settings. |
85
92
|[Office](https://github.com/Microsoft/PowerStig/wiki/Office)| Provides a mechanism to manage Microsoft Office STIG settings. |
93
+
|[OracleJRE](https://github.com/Microsoft/PowerStig/wiki/OracleJRE)| Provides a mechanism to manage Oracle Java Runtime Environment STIG settings. |
94
+
|[RHEL](https://github.com/Microsoft/PowerStig/wiki/RHEL)| Provides a mechanism to manage RedHat Enterprise Linux STIG settings. |
86
95
|[SqlServer](https://github.com/Microsoft/PowerStig/wiki/SqlServer)| Provides a mechanism to manage SqlServer STIG settings. |
96
+
|[Ubuntu](https://github.com/Microsoft/PowerStig/wiki/Ubuntu)| Provides a mechanism to manage Ubuntu Linux STIG settings. |
97
+
|[Vsphere](https://github.com/Microsoft/PowerStig/wiki/Vsphere)| Provides a mechanism to manage VMware Vsphere STIG settings. |
98
+
|[WindowsClient](https://github.com/Microsoft/PowerStig/wiki/WindowsClient)| Provides a mechanism to manage Windows Client STIG settings. |
99
+
|[WindowsDefender](https://github.com/Microsoft/PowerStig/wiki/WindowsDefender)| Provides a mechanism to manage Windows Defender STIG settings. |
87
100
|[WindowsDnsServer](https://github.com/Microsoft/PowerStig/wiki/WindowsDnsServer)| Provides a mechanism to manage Windows DNS Server STIG settings. |
88
101
|[WindowsFirewall](https://github.com/Microsoft/PowerStig/wiki/WindowsFirewall)| Provides a mechanism to manage the Windows Firewall STIG settings. |
89
102
|[WindowsServer](https://github.com/Microsoft/PowerStig/wiki/WindowsServer)| Provides a mechanism to manage the Windows Server STIG settings. |
@@ -134,3 +147,4 @@ We are especially thankful for those who have contributed pull requests to the c
Copy file name to clipboardExpand all lines: source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R7_Manual-xccdf.log
+2-2
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
V-221561::3. If the value name DefaultPopupsSetting::3. If the DefaultPopupsSetting value name
1
+
V-221561::3. If the value name DefaultPopupsSetting::3. If the DefaultPopupsSetting value name
2
2
V-221562::3. If the a registry value name of 1 does not exist under that key or its value is not set to *::3. If the 1 value name does not exist under that key or its value data is not set to *
3
3
V-221597::3. If the “::3. If the "
4
4
V-221599::3. If the key "DeveloperToolsAvailability"::3. If the "DeveloperToolsAvailability" value name
@@ -10,4 +10,4 @@ V-221588::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Ke
10
10
V-221596::*::HardCodedRule(RegistryRule)@{DscResource = 'RegistryPolicyFile'; Key = 'HKEY_LOCAL_MACHINE\Software\Policies\Google\Chrome'; ValueName = 'AutoplayAllowlist'; ValueType = 'MultiString'; ValueData = $null; OrganizationValueTestString = "{0} -eq 'a list of administrator-approved URLs"}
Copy file name to clipboardExpand all lines: source/StigData/Archive/Chrome/U_Google_Chrome_STIG_V2R8_Manual-xccdf.log
+1-1
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
V-221561::3. If the value name DefaultPopupsSetting::3. If the DefaultPopupsSetting value name
1
+
V-221561::3. If the value name DefaultPopupsSetting::3. If the DefaultPopupsSetting value name
2
2
V-221562::3. If the a registry value name of 1 does not exist under that key or its value is not set to *::3. If the 1 value name does not exist under that key or its value data is not set to *
3
3
V-221597::3. If the “::3. If the "
4
4
V-221599::3. If the key "DeveloperToolsAvailability"::3. If the "DeveloperToolsAvailability" value name
V-204512::*::HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/etc/audisp/audisp-remote.conf'; OrganizationValueTestString = 'the "network_failure_action" option is set to "SYSLOG", "SINGLE", or "HALT"; i.e.: "network_failure_action = syslog" '}
23
23
V-204515::*::HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/etc/audit/auditd.conf'; OrganizationValueTestString = 'the value of the "action_mail_acct" keyword is set to "root" and/or other accounts for security personnel; i.e.: "action_mail_acct = root" '}
24
24
V-204576::*::HardCodedRule(nxFileRule)@{DscResource = 'nxFile'; Contents = $null; FilePath = '/etc/security/limits.d/204576-powerstig.conf'; OrganizationValueTestString = 'the "maxlogins" value is set to "10" or less '}
25
-
V-204579::*::HardCodedRule(nxFileRule)@{DscResource = 'nxFile'; FilePath = '/etc/profile.d/tmout.sh'}<splitRule>HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/etc/profile.d/tmout.sh'; OrganizationValueTestString = 'the following statement is true when leveraging the correct nxFileLine ContainsLine format: "If the file "/etc/profile.d/tmout.sh" does not exist with the contents shown above, the value of "TMOUT" is greater than 900, or the timeout values are commented out, this is a finding.'}
25
+
V-204579::*::HardCodedRule(nxFileRule)@{DscResource = 'nxFile'; FilePath = '/etc/profile.d/tmout.sh'}<splitRule>HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/etc/profile.d/tmout.sh'; OrganizationValueTestString = 'the following statement is true when leveraging the correct nxFileLine ContainsLine format: "If the file "/etc/profile.d/tmout.sh" does not exist with the contents shown above, the value of "TMOUT" is greater than 900, or the timeout values are commented out, this is a finding.'}<splitRule>HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/etc/bashrc'; OrganizationValueTestString = 'the following statement is true when leveraging the correct nxFileLine ContainsLine format: "If the file "/etc/bashrc" does not exist with the contents shown above, the value of "TMOUT" is greater than 900, or the timeout values are commented out, this is a finding.'}<splitRule>HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/etc/profile'; OrganizationValueTestString = 'the following statement is true when leveraging the correct nxFileLine ContainsLine format: "If the file "/etc/profile" does not exist with the contents shown above, the value of "TMOUT" is greater than 900, or the timeout values are commented out, this is a finding.'}
V-244557::*::HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/boot/grub2/grub.cfg'; OrganizationValueTestString = '"set superusers =" is set to a unique name in /boot/grub2/grub.cfg'}
41
41
V-244558::*::HardCodedRule(nxFileLineRule)@{DscResource = 'nxFileLine'; ContainsLine = $null; DoesNotContainPattern = $null; FilePath = '/boot/efi/EFI/redhat/grub.cfg'; OrganizationValueTestString = '"set superusers =" is set to a unique name in /boot/efi/EFI/redhat/grub.cfg'}
V-255926::*::HardCodedRule(nxPackageRule)@{DscResource = 'nxPackage'; Ensure = 'Present'; Name = $null; OrganizationValueTestString = 'Specify either tmux or screen depending on preference'}
0 commit comments