The granular sync mechanism in our workspace management software allows users files to be synced to on-premises or cloud-based storage from anywhere within their user profileeither in the background, on-demand or in real-timeto provide effortless migration of users files and eliminate the issue of data sprawl where user files are saved across different devices. Marketing Dashboards. These options are available when you open or submit a new issue and when you edit an active support case. Microsoft Intune is a cloud-based service that focuses on mobile device management (MDM) and mobile application management (MAM). While this could just be an accidental oversight on the users part, theres a risk that its something much more serious. In Softonic we scan all the files hosted on our platform to assess and avoid any potential harm for your device. AccessPatrol is a USB device control software solution that protects sensitive data against theft to portable storage devices. carrie.laudie@ivanti.com, https://www.businesswire.com/news/home/20221110005113/en/. Dont let a preventable data leak ruin your organization. Additionally, the Ivanti Neurons suite of IT management solutions was recognized as the Best Reduction of Security Impacts on User Experiences. CurrentWares USB blocker software AccessPatrol allows you to block or unblock USB ports in just a few clicks, making USB security simple and scalable. Doing it via regular GPO causes a whole host of other problems because the GPO blocks removable devices not just storage. Your cybersecurity risk management program needs to extend far beyond a USB block. If you choose to leave any USB ports enabled it completely defeats the purpose of using a USB blocker in the first place. +1 650-963-6011 Language/Region. As a desktop app, it is simple and effective, connecting personal devices to the corporate VPN for work on the go or ease of access. Automate deployments, personalize user workspaces and fix issues quickly, everywhere. About Enterprise Management Associates, Inc. As a company, Ivanti was born out of a series of mergers and acquisitions. Acquired by the IT software company Ivanti, the Pulse Client creates and maintains a secure connection on Windows, Android, and iPhone. Technical support is provided via the Ivanti Support Portal or over the phone. Ivanti Neurons for Vulnerability Knowledge Base. Secure and manage systems from one console. Paid consultations are available for assistance with solution planning, design and deployment. Compare and find the best Unified Endpoint Management Tools for your organization. Ivanti Neurons Patch for MEM Browser Manager. On Windows devices this can be accomplished using the BIOS, by modifying Registry keys, disabling USB root hubs in Device Manager, or physically removing the USB ports altogether. Granular policies allow you to assign permissions for authorized removable devices and media to individual users or user groups. MobileIron, an Ivanti Company: MobileIron Platform 11: v11: NIAP Validation Completed (at Gossamer) Samsung SDS: Enterprise Mobility Management (EMM) v2.2.5: NIAP Validation Completed (at Gossamer) VMware. With so many security risks it can be risky to support allowing even trusted users to use their USB ports. united states of america. 10,523,660. united states of america. In 2015, Lumension and FrontRange merged to create HEAT Software, driven by private equity firm Clearlake Capital. unified vpn and identity based authentication to cloud-based services. It supports various Linux distros including Ubuntu, OpenSUSE, RedHat and CentOS. AccessPatrol has been verified as Citrix Ready. While this may be feasible in environments that genuinely have no use for USB ports, when you block USB ports in this way you also prevent the use of modern day keyboards and mice, among other USB devices that are essential for business use. AccessPatrol is a module within the CurrentWare Suite. Ivanti Microsoft Intune is a cloud-based unified endpoint management, access management, and data protection platform. Cisco Unified Communications Manager Cloud for Government (Cisco UCM Cloud for Government) Service Model: SaaS. Sai Kit Chu is a Product Manager with CurrentWare. Both VPN services require a paid license but offer a free trial, and neither requires an entry-level setup fee. Beyond the ability to block removable storage devices it can permit temporary or scheduled access to USB devices, selectively restrict data transfers based on file name and extension, and more. A USB blocker works in tandem with these administrative security controls to ensure your users avoid high-risk behavior such as using personal USB devices or stealing data for personal or professional gain. See you next time! Manufacturing Execution Systems. chevron_right. Between the costs associated with a damaged reputation, fines, loss of competitive advantage, and remediation, a data breach like this could completely ruin a company. Ensure devices and apps are compliant with your security requirements. Disclaimer: The information provided in this article is solely the authors opinion and not investment advice it is provided for educational purposes only. Make sure you team has someone to set this up and have the machine to host the software. As a result, a new company was established under the name Ivanti. AccessPatrol uses a software client to enforce data loss prevention policies on devices no matter which network they are connected to, making it the ideal solution for protecting remote workers. This application does an amazing job of controlling all of your Endpoints. There are no current plans to develop a STIG. It is free for up to 25 devices in LAN; the free version contains all of the features except for the ability to have multiple administrator accounts. This product has potential but its similar in cost to other products has some difficulty in configuring due to outdated labelling in the console, and doesnt cover as much as other products. Control how your organizations devices are used, including mobile phones, tablets, and laptops, Enforce compliance with computer security requirements across an entire organization, Misconfigurations are likely to cause disruption to users and can be difficult to undo, Selectively allowing approved USBs requires complex manual parameter tuning in an XML file, Enterprise Mobility + Security E3 $10.60 user/month, Enterprise Mobility + Security E5 $16.40 user/month. The app uses SSL to provide instant access to business applications and data from anywhere at any time, and it adds layers of protection to any and all activity within Pulse Secures protection. Should one of the removable devices go missing the integrity of the data will be compromised, not to mention the potential data breach if the data wasnt encrypted. This software delivers on the essential tasks required for security monitoring files by running real-time and audit reports of who, what, where, and when. The DoD Cyber Exchange is sponsored by Microsoft Endpoint Manager (MEM) Microsoft recently brought both Config Manager and Intune together into Microsoft Endpoint Manager (MEM). While it is not a verified Citrix Ready partner the vendor does note that the Ivanti Device Control software clients are compatible with Citrix XenApp and XenDesktop. However, the price will be substantial and, for those running non-Microsoft platforms, there are some overlooked features, too. In order to effectively achieve digital transformation objectives, businesses must embrace modern management technologies that dynamically monitor and improve end user experiences in real time, noted Steve Brasen, Research Director at EMA. Manager Training. While it will require a greater initial investment than epoxy, the ability to protect your ports from permanent damage is more than worth it. If the download doesn't start automatically, click here. "Unified IT is acheivable with Ivanti Endpoint Manager" The latest versions of Endpoint Manager are starting to finally show the fruit of the merger and concept of Unified IT at Ivanti. Ivanti Security Controls simplifies security with unified and automated prevention, detection, and response techniques that target your biggest attack vectors. Microsoft provides global technical, pre-sales, billing, and subscription support for device management cloud-based services, including Intune, Configuration Manager, Windows 365, and Microsoft Managed Desktop. Learn More: AccessPatrol pricing and licensing FAQ. Administrators can preemptively contain threats before they have the opportunity to spread to other employees. Product support for AccessPatrol is available from a variety of channels. CurrentWare for NIST 800-171 & 800-53 Compliance, USB storage devices (Jump Drive, Data Stick, Thumb Drive, Flash Drives, etc). This memorandum, signed on November 8, 2021, updates and replaces DoD CIO Memorandum "Commercial Public Key Infrastructure Certificates on Public-Facing DoD Websites" dated November 6, 2020. The bundle options with Azure-based identity and security tools have matured and represent a powerful growth path. This ensures that even allowed devices cant transfer sensitive data. The VPNoperates similarly to other business-oriented VPN applications, such as Zscaler, ExpressVPN, or Cisco AnyConnect. AccessPatrol has a variety of device control capabilities. Its layout is well designed which makes it unchallenging for all kinds of users to work on this software, irrespective of their technical background. CyberArk Endpoint Privilege Manager for Government. AccessPatrols central console allows you to apply security policies and run reports on your users USB activities from the convenience of a web browser. Ivanti, Inc. All rights reserved. We already use a lot of Microsoft products in our company, and therefore, it made sense to also use this product. Get started immediately with a free trial of AccessPatrol, CurrentWares USB blocking software. You can further refine how granular this data is by limiting the time frame, selecting only specific groups, and even investigating individual users. In the end, its best to give the free trial a shot and decide for yourself whether this is the best security for your business. English (Global) English (Australia) scalable, and secure service and endpoint management solutions that solve common business challenges. HEAT Software was a leader in the unification of Cloud Service Management and Unified Endpoint Management until it merged with LANDESK in 2017 to form Ivanti. Windows server 2003 (Conditional support). It gives us a way to secure devices, not only those that are steady. When Intune is connected with Microsoft Endpoint Configuration Manager in a hybrid configuration, you can also manage Macs, Unix and Linux servers, and Windows Server machines from a single management console. Disclaimer: The information provided in this article is solely the authors opinion and not investment advice it is provided for educational purposes only. NIAP Validation Completed (at BAH) Heres an overview of AccessPatrols key features. Gartner names Ivanti a Leader in unified endpoint management tools. chevron_right. What's your digital employee experience like? asserting a mobile identity to users and devices in an enterprise authentication system. For example, you can use USB blocker software for blocking USB ports for any user or computer with access to sensitive data while leaving the USB blocker turned off for users that pose less risk. If Status field is set to 'Vulnerable', the Version field indicates vulnerable version(s) if these version numbers are known to us. More than just an expensive layer of protection, Pulse Secure can provide a complete view of user, gateway, device, and application access. q&a chevron_right. Create custom rules to detect and block transfer of data you consider sensitive. Customers with a Premier or Unified support contract have additional options for support. It means a benign program is wrongfully flagged as malicious due to an overly broad detection signature or algorithm used in an antivirus program. Service Manager. Note: Microsoft Intune is a dedicated mobile device management (MDM) and mobile application management (MAM). Take Two Steps to Obtain Endpoint Compliance and Data Protection Join industry experts, Tim Warner, and Jillian Salamon of Quest Software, as they walk you through practical steps to achieve endpoint compliance. Looking for even more protection? Use AccessPatrol on a Windows PC or in a Citrix VDI deployment for free to test its USB blocking capabilities in your environment. Ivanti finds, heals and protects every device, everywhere automatically. This means all requests will fail if Windows is attempting to route WSL traffic back through the VPN instead of routing through the internal network. Contact. The CurrentWare Suite includes multiple solutions for protecting data: AccessPatrol is exclusively available on Windows. PP_APP_v1.3: Booz Allen Hamilton Common Criteria Testing Laboratory Having these metrics available at a glance makes detecting potential insider threats far more efficient as your organization scales. Take back control over portable storage devices with a free trial of AccessPatrol. Check out our list of the best internet filters and the best employee monitoring software. While ManageEngine has an extensive product portfolio with many users, reviews for ManageEngine Device Control Plus specifically are difficult to come by. Ivanti Device Control provides a variety of advanced device control features including forced data encryption, off-network compatibility, and full auditing of all Administrator actions. Most often they leverage internal vswitches and a built in NAT to make the UX easy.Currently we do not support WSL2 with user layers or UPL, however we are working to address some issues that relate to general virtualization support when user layers are enabled. Based on reviews, ManageEngine Device Control Plus works great as a basic device control software for restricting removable devices, but their customer support is lacking and their feature set does not compete with more advanced device control products. USB security hardware such as a USB data blocker (USB condom) can allow charging via USB without enabling data transfer. While the initial setup of Endpoint Protector By CoSoSys is complex, the ability to create custom rules to detect and block transfer of data you consider sensitive allows for greater protection of confidential data than a traditional device control software solution. Ivanti (/ i v n t i /) is an IT software company headquartered in South Jordan, Utah, United States.It produces software for IT Security, IT Service Management, IT Asset Management, Unified Endpoint Management, Identity Management and Supply Chain Management.It was formed in January 2017 with the merger of LANDESK and HEAT Software, and later acquired As a customer with a Premier or Unified support contract, you can specify a severity for your issue, and schedule a support callback for a specific time and day. With Ivanti Endpoint Manager, have peace of mind knowing you can manage your modern device fleet in the Anywhere Workplace. The Version relates to the Status column. Ivanti | 71,144 followers on LinkedIn. Perpetual licenses for 100 computers are available for US$1,488 with a cost of US$298 per year for support and maintenance, Basic annual maintenance and support is included with the subscription; 4 hours of web-based product training is available for US$495, Multiple add-ons are available including a failover service, secure gateway server, and a multi-language pack license. The annual subscription is US$595 for 100 Computers ($5.95 per computer per year). Todays video is just a sneak peek of what AccessPatrol is capable of; as time goes on you can expect to see further enhancements and data points added to these dashboards. Unified Endpoint Management Tools. I like use agents and this product involves installing an agent on the device that will then report in. Device control and reporting on devices was exceptional often even down to the make/model and serial number of the device being attached. Over 40,000 customers, including 96 of the Fortune 100, have chosen Ivanti to discover, manage, secure, and service their IT assets from cloud to edge, and deliver excellent end-user experiences for employees, wherever and however they work. I would recommend exploring other products on the market. The Ivanti Neurons autonomous platform provides a seamless employee experience across all devices and offers unparalleled capabilities to organizations.. 6681 reviews on 63 vendors. It supports Active Directory import and sync that allows you to manage your users with your existing organizational units alongside non-AD users. As the creation of custom rules is complex and unique to each organization this added training can be of great benefit. AccessPatrol includes key features to prevent data leakage to portable drives: Learn More: Which devices can I control with AccessPatrol? Learn more about Ivanti Neurons for Digital Experience. Enterprise Mobility + Security E5 includes all the capabilities of Enterprise Mobility + Security E3 plus Azure Active Directory Premium (AADP) P2, Azure Information Protection P2, Microsoft Cloud App Security, Azure Active Directory [AD] Identity Protection (as a feature of AADP P2), Azure Advanced Threat Protection, Azure AD Privileged Identity Management (as a feature of AADP P2). Getting the status on your current problem etc. We have scanned the file and URLs associated with this software program in more than 50 of the world's leading antivirus services; no possible threat has been detected. 10161 Park Run Drive, Suite 150 Las Vegas, Nevada 89145. Ivanti Neurons for ITSM (Formerly Service Manager) Service Model: SaaS. A USB blocker is an essential part of any data theft prevention strategy. ManageEngine Device Control Plus is compatible with both Windows and macOS. Preventing users from stealing data or transferring malicious files with easily concealed USB flash drives, Maintaining auditable records of file transfers to portable storage devices, and, Triggering real-time alerts when security policies are violated, All files that have been copied, created, renamed, or deleted on USB storage devices, and, A timestamped device history for each user, including attempts to use blocked devices, Preventing data loss by stopping users from stealing data or transferring malicious files with easily concealed USB flash drives, Allowing you to identify devices that have been used on your endpoints, Maintaining auditable records of file transfers to portable storage, and, Device control policies can be customized based on user and computer groups; it integrates with Active Directory to simplify user management, At $3.99 PUPM its the best value device control software when compared to those with a similar feature set, Integrates with the CurrentWare Suite to protect corporate data against high-risk websites and user activity, Easy-to-use interface and operator accounts allow for trusted employees to perform centralized monitoring and adjust USB data security policies as needed, Device control capabilities require a software agent to be installed, While AccessPatrol works with both encrypted and unencrypted usb devices, an external tool is required to enforce data encryption. Manage Engine products seem to be about 80% complete. Ivanti Neurons for Digital Experience enables organizations to autonomously track, score, and optimize their employees digital experience to improve productivity, security, and employee retention. This is the recommended option, as the biggest strike against using Pulse Secure is that there are other strong VPN competitors on the market. In many ways, Cisco AnyConnect can come across as overwhelming and falls short of the more straightforward, user-friendly experience Pulse Secure offers for Windows. To view a complimentary copy of the EMA Radar for Digital Employee Experience Management and to learn more about Ivantis positioning, please visit here. These enhancements may permit us to support WSL2 in the future, however we cannot confirm when support will be available at this time.Perfect timing! Even if USB drives arent intentionally infected with malware, personal USB devices are at a greater risk of inadvertent infections. Its price can be improved. We can manage their life cycle and verify that theyre updated properly.Cons: It doesnt economize when you scale up. Which devices can I control with AccessPatrol? Digital Employee Experience is vital for operational success, not only for employee retention but also for security. Get started today with a free trial of AccessPatrol, CurrentWares USB control software. AccessPatrol operates from the same central console as the other modules in the CurrentWare Suite. To report a problem and get technical assistance. Overall just a pleasure to work with. English (Global) English (Australia) English (United Kingdom) Deutsch Espaol Why? LANDESK offers proven solutions encompassing Unified Endpoint Management, Security Management, Asset Management, and Service Management to help customers maximize user productivity while reducing the associated complexities, risks, and costs to the business. Read the Report. A user only needs one port to use unauthorized hardware to transfer files. The trial license allows access to all Endpoint Protectors features for a period of 30 days. Ivanti Neurons for Digital Experience effectively measures and proactively optimizes the experience employees have on the devices and applications they rely on in their Everywhere Workplace. Ivanti Neurons for Digital Experience equips IT teams with insights and intelligent automation to proactively detect and resolve issues and security vulnerabilities to provide better digital employee experiences and business outcomes.. At this time, AccessPatrol can track activities from the following peripherals: This device usage data is used to populate various graphs across AccessPatrols dashboards. With industry-leading unified endpoint management, Pulse Secure can safeguard and manage your companys data and devices. These administrators can then identify anomalous or malicious users and devices at a glance. The best USB blocker software (device control software) are centrally-managed device control tools that allow you to selectively enable and disable what types of peripheral devices can be used and which endpoints/users are permitted to use them. Get started todayDownload the FREE template and customize it to fit the needs of your organization. While Gilisoft USB Lock is not the best device control solution for businesses, its affordable pricing, variety of features, and simple interface make it an ideal choice for home users that want to prevent data theft, restrict internet use, and stop unwanted apps from launching. Enterprise Mobility + Security E3 includes Azure Active Directory Premium P1, Microsoft Intune, Azure Information Protection P1, Microsoft Advanced Threat Analytics, Azure Rights Management (part of Azure Information Protection) and the Windows Server CAL rights. AccessPatrols central console allows you to centrally manage devices and run reports on your users USB activities from the convenience of a web browser. As such, the best way to decide with one is your preference is to simply download the free trial for each and see which better synergizes with your workplace. ManageEngine provides email support (during the business hours) for signing-up, usage assistance, problem diagnosis and resolution, clarification in documentation, and technical guidance. 0. Pulse Secures capacity to combine employee protection and management is the main draw of using it as a security solution. Ivanti Neurons for Unified Endpoint Management. Monitor, control and block file transfers. WSL 2 uses a virtual network switch connected to an internal network to route requests between Windows and WSL. They work in tandem with AccessPatrols device control features and USB activity reports to protect sensitive data against the security risks of portable storage devices. With a USB blocker you can improve data security by limiting what files are allowed to be transferred to a USB device. Control other devices such as Bluetooth, Firewire, SD/MM cards, and scanners. This protection is not free, however, and while Pulse Secure is more expensive, it does offer a free trial. National Centers of Academic Excellence in Cybersecurity (NCAE-C), Public Key Infrastructure/Enabling (PKI/PKE), 2016-04-21 DoD CIO Memo - Use of Wearable Devices DoD Accredited Spaces with FAQ, A10 Networks Application Delivery Controller (ADC) NDM STIG Ver 1, A10 Networks Application Delivery Controller (ADC) Overview, Ver 1, A10 Networks Application Delivery Controller (ADC) STIG Ver 1 Release Memo, Active Directory Domain STIG - Ver 3, Rel 2, Active Directory Forest STIG - Ver 2, Rel 8, Adobe Acrobat Pro DC STIGs - Release Memo, Adobe Acrobat Professional DC Continuous Track STIG - Ver 2, Rel 1, Adobe Acrobat Reader DC Continuous Track STIG - Ver 2, Rel 1, Adobe Acrobat Reader DC Continuous Track STIG Benchmark - Ver 2, Rel 2, Adobe Acrobat Reader DC STIG Release Memo, Akamai KSD Service IL2 ALG STIG Version 1, Akamai KSD Service IL2 NDM STIG Version 1, Akamai KSD Service IL2 STIG Ver 1 Release Memo, Apache Tomcat Application Server 9 STIG - Ver 2, Rel 4, Apple macOS 11 (Big Sur) STIG - Ver 1, Rel 6, Apple macOS 12 (Monterey) STIG - Ver 1, Rel 4, Application Layer Gateway (ALG) SRG - Ver 1, Rel 2, Application Layer Gateway (ALG) SRG Release Memo - Ver 1, Application Security and Development STIG - Ver 5, Rel 2, Backbone Transport Services (BTS) Policy STIG Ver 3 Release Memo, BlackBerry Enterprise Mobility Server (BEMS) 2.x STIG - Ver 1, Rel 3, BlackBerry Enterprise Mobility Server (BEMS) 3.x STIG - Ver 1, Rel 1, Canonical Ubuntu 18.04 LTS STIG - Ver 2, Rel 9, Canonical Ubuntu 18.04 LTS STIG Benchmark - Ver 2, Rel 7, Canonical Ubuntu 18.04 LTS STIG for Ansible - Ver 2 Rel 9, Canonical Ubuntu 20.04 LTS STIG - Ver 1, Rel 6, Canonical Ubuntu 20.04 LTS STIG Benchmark - Ver 1, Rel 4, Canonical Ubuntu 20.04 LTS STIG for Ansible - Ver 1, Rel 6, Cisco IOS XE Router NDM RTR STIG for Ansible - Ver 2, Rel 3, Cisco IOS XE Router STIG for Ansible - Ver 2, Rel 1, Cisco IOS-XE Router NDM STIG Benchmark - Ver 1, Rel 5, Cisco IOS-XE Router RTR STIG Benchmark - Ver 1, Rel 2, Citrix Virtual Apps and Desktops (VAD) 7.x STIG, Cloud Computing Mission Owner Draft Comment Matrix, Cloud Computing Mission Owner Draft SRG - Ver 1, Rel 0.1, Cloud Service Providers in FedRAMP Process, Crunchy Data PostgreSQL STIG - Ver 2, Rel 1, Database Security Requirements Guide (SRG) - Ver 2 Release Memo, Docker Enterprise 2.x Linux/Unix - Ver 2, Rel 1, Docker Enterprise 2.x Linux/Unix STIG for Ansible - Ver 1, Rel 1, DoD Annex for Application Software Extended Package for Web Browsers - Ver 1, Rel 1, DoD Annex for MDM Protection Profile V4.0 - Ver 1, Rel 3, DoD Annex for Mobile Device Fundamentals Protection Profile V3.2 - Ver 1, Rel 3, DoD Annex for PP - Module for MDM Agents V1.0 - Ver 1, Rel 3, DoD Enterprise DevSecOps Reference Design: CNCF Kubernetes, DoD Internet-NIPRNet DMZ STIG, Ver 3 Release Memo, EDB Postgres Advanced Server STIG - Ver 2, Rel 2, EDB Postgres Advanced Server v11 for Windows STIG - Ver 2, Rel 2, Enclave Test and Development STIG Release Memo, Esri ArcGIS Server 10.3 STIG - Ver 1, Rel 3, Esri ArcGIS Server 10.3 STIG Ver 1 Release Memo, ForeScout CounterACT ALG STIG - Ver 1, Rel 2, ForeScout CounterACT STIG Ver 1 Release Memo, General Purpose Operating System SRG - Ver 2, Rel 4, Google Chrome STIG Benchmark - Ver 2, Rel 7, Google Search Appliance STIG Ver 1 - Release Memo, Group Policy Objects (GPOs) - October 2022, How to Create and SRG-STIG ID Mapping Spreadsheet, HPE 3PAR StoreServ 3.2.x STIG - Ver 2, Rel 1, HPE 3PAR StoreServ OS STIG - Ver 1, Rel 1, HPE Nimble Storage Array STIG - Ver 1, Rel 1, IBM Aspera Platform 4-2 STIG - Ver 1, Rel 2, IBM Aspera Platform 4.2 STIG - Ver 1, Rel 1, IBM Hardware Management Console (HMC) STIG - Ver 1, Rel 5, IBM Hardware Management Console (HMC) STIG - Ver 1, Release Memo, IBM MaaS360 with Watson v10-x MDM STIG - Ver1, Rel 2, IBM MaaS360 with Watson v10-x MDM STIG Ver 1 Release memo, IBM MQ Appliance v9-0 STIG V1 Release Memo, IBM WebSphere Liberty Server STIG - Ver 1, Rel 2, IBM WebSphere Traditional V9.x STIG Version 1, IBM WebSphere Traditional V9.x STIG Version 1 Release Memo, IBM zVM Using CA VMSecure STIG - Ver 2, Rel 2, Interim Guidance for the Use of Canonical Names (CNAME) in Cloud Computing, Intrusion Detection and Prevention System SRG - Ver 2, Rel 6, Ivanti MobileIron Core MDM Server STIG - Ver 1, Rel 1, Ivanti MobileIron Sentry 9.x STIG - Ver 1 Rel 1, JIE Core Data Center (CDC) STIG Ver 2 Release Memo, JIE Enterprise Operations Center JIE Management Network (EOC/JMN) STIG Release Memo, JIE Enterprise Remote Access STIG, Ver 1 Release Memo, JIE Installation Campus Area Network STIG Release Memo, JIE Installation Processing Node (IPN) STIG Ver 2 Release Memo, Juniper SRX SG STIG for Ansible - Ver 1, Rel 1, MariaDB Enterprise 10.x STIG - Ver 1, Rel 2, McAfee Application Control 7.x STIG - Ver 1, Rel 3, McAfee Application Control 8.x STIG - Ver 2, Rel 1, McAfee Virus Scan 8.8 Overview - Ver 5, Rel 7, McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client STIG - Ver 1, Rel 3, Microsoft .Net Framework 4 STIG Benchmark - Ver 2, Rel 1, Microsoft .Net Framework 4.0 STIG - Ver 2, Rel 2, Microsoft .Net Framework Security Checklist - Ver 1, Rel 3, Microsoft Access 2010 STIG - Ver 1, Rel 10, Microsoft Access 2013 STIG - Ver 1, Rel 6, Microsoft Access 2016 STIG - Ver 1, Rel 1, Microsoft Azure SQL Database STIG - Ver 1, Rel 1, Microsoft Defender Antivirus STIG - Ver 2, Rel 4, Microsoft Defender Antivirus STIG Benchmark - Ver 2, Rel 3, Microsoft Edge STIG Benchmark - Ver 1, Rel 2, Microsoft Excel 2010 STIG - Ver 1, Rel 11, Microsoft Excel 2016 STIG - Ver 1, Rel 2, Microsoft Exchange 2010 Client Access STIG - Ver 1, Rel 9, Microsoft Exchange 2010 Edge STIG - Ver 1, Rel 14, Microsoft Exchange 2010 Edge Transport Server STIG - Ver 1, Rel 15, Microsoft Exchange 2010 Hub STIG - Ver 1, Rel 12, Microsoft Exchange 2010 Mailbox STIG - Ver 1, Rel 10, Microsoft Exchange 2010 Overview - Ver 1, Rel 6, Microsoft Exchange 2010 STIG Release Memo, Microsoft Groove 2013 STIG - Ver 1, Rel 3, Microsoft InfoPath 2010 STIG - Ver 1, Rel 11, Microsoft InfoPath 2013 STIG - Ver 1, Rel 5, Microsoft Internet Explorer 11 STIG - Ver 2, Rel 3, Microsoft Internet Explorer 11 STIG Benchmark - Ver 2, Rel 3, Microsoft Office 2010 Overview - Ver 1, Rel 12, Microsoft Office 2013 Overview - Ver 1, Rel 5, Microsoft Office 365 ProPlus STIG - Ver 2, Rel 7, Microsoft Office System 2010 STIG - Ver 1, Rel 12, Microsoft Office System 2013 STIG - Ver 2, Rel 1, Microsoft Office System 2016 STIG - Ver 2, Rel 2, Microsoft OneDrive for Business 2016 STIG - Ver 1, Rel 3, Microsoft OneNote 2010 STIG - Ver 1, Rel 9, Microsoft OneNote 2013 STIG - Ver 1, Rel 3, Microsoft OneNote 2016 STIG - Ver 1, Rel 2, Microsoft Outlook 2010 STIG - Ver 1, Rel 13, Microsoft Outlook 2013 STIG - Ver 1, Rel 13, Microsoft Outlook 2016 STIG - Ver 2, Rel 3, Microsoft PowerPoint 2010 STIG - Ver 1, Rel 10, Microsoft PowerPoint 2013 STIG - Ver 1, Rel 6, Microsoft PowerPoint 2016 STIG - Ver 1, Rel 1, Microsoft Project 2010 STIG - Ver 1, Rel 9, Microsoft Project 2013 STIG - Ver 1, Rel 4, Microsoft Project 2016 STIG - Ver 1, Rel 1, Microsoft Publisher 2010 STIG - Ver 1, Rel 11, Microsoft Publisher 2013 STIG - Ver 1, Rel 5, Microsoft Publisher 2016 STIG - Ver 1, Rel 3, Microsoft SharePoint 2013 STIG - Ver 2, Rel 3, Microsoft Sharepoint Designer 2013 STIG - Ver 1, Rel 3, Microsoft Skype for Business 2016 STIG - Ver 1, Rel 1, Microsoft Windows 10 STIG Benchmark - Ver 2, Rel 6, Microsoft Windows 11 STIG Benchmark - Ver 1, Rel 1, Microsoft Windows 2012 and 2012 R2 DC STIG- Ver 3, Rel 5, Microsoft Windows 2012 and 2012 R2 MS STIG - Ver 3, Rel 5, Microsoft Windows 2012 Server Domain Name System STIG - Ver 2, Rel 5, Microsoft Windows Firewall STIG and Advanced Security STIG - Ver 2, Rel 1, Microsoft Windows Firewall STIG Benchmark - Ver 2, Rel 1, Microsoft Windows Lifecycle Support Information, Microsoft Windows Operating Systems Overview - Ver 1, Rel 5, Microsoft Windows Privileged Access Workstation (PAW) STIG - Ver 2, Rel 2, Microsoft Windows Server 2012 and 2012 R2 DC STIG Benchmark - Ver 3, Rel 4, Microsoft Windows Server 2012 and 2012 R2 MS STIG Benchmark - Ver 3, Rel 4, Microsoft Windows Server 2016 STIG - Ver 2, Rel 5, Microsoft Windows Server 2016 STIG Benchmark - Ver 2, Rel 3, Microsoft Windows Server 2016 STIG for Chef - Ver 1, Rel 3, Microsoft Windows Server 2016 STIG for PowerShell DSC - Ver 1, Rel 3, Microsoft Windows Server 2019 STIG - Ver 2, Rel 5, Microsoft Windows Server 2019 STIG Benchmark - Ver 2, Rel 3, Microsoft Windows Server 2019 STIG for Chef - Ver 1, Rel 2, Microsoft Windows Server 2022 - Ver 1, Rel 1, Microsoft Windows Server 2022 Draft Benchmark Comment Matrix, Microsoft Windows Server 2022 SCAP Draft STIG Benchmark - Ver 1, Rel 0.1, MobileIron Core v10.x MDM STIG Ver 1 Rel 1, MongoDB Enterprise Advanced 3.x STIG - Ver 2, Rel 1, MongoDB Enterprise Advanced 4.x STIG - Ver 1, Rel 2, Motorola Solutions Android 11 - Ver 1, Rel 2, Mozilla Firefox for Linux STIG Benchmark - Ver 6, Rel 3, Mozilla Firefox for Windows STIG Benchmark - Ver 6, Rel 3, Multifunction Device and Network Printers STIG - Ver 2, Rel 14, Network Device Management SRG - Ver 4, Rel 1, Network Infrastructure Policy STIG - Ver 10, Rel 3, Network Management Security Guidance At-a-Glance, Oracle Database 11.2g STIG - Ver 2, Rel 3, Oracle HTTP Server 12.1.3 STIG - Ver 2, Rel 1, Oracle Linux 7 STIG Benchmark - Ver 2, Rel 9, Oracle Linux 8 STIG Benchmark - Ver 1, Rel 3, Oracle Linux 8 STIG for Ansible - Ver 1, Rel 4, Oracle WebLogic Server 12c - Ver 2, Rel 1, Oracle WebLogic Server 12c Release Memo - Ver 1, Palo Alto Networks Prisma Cloud Compute STIG - Ver 1, Rel 2, Palo Alto Networks STIG for Ansible - Ver 1, Rel 4, Rancher Government Solutions RKE2 STIG - Ver 1, Rel 1, Rancher Government Solutions Multi-Cluster Manager STIG - Ver 1, Rel 2, Red Hat Enterprise Linux 7 STIG - Ver 3, Rel 9, Red Hat Enterprise Linux 7 STIG Benchmark - Ver 3, Rel 9, Red Hat Enterprise Linux 7 STIG for Ansible - Ver 3 Rel 9, Red Hat Enterprise Linux 7 STIG for Chef - Ver 3, Rel 8, Red Hat Enterprise Linux 8 STIG - Ver 1, Rel 8, Red Hat Enterprise Linux 8 STIG Benchmark - Ver 1, Rel 7, Red Hat Enterprise Linux 8 STIG for Ansible - Ver 1 Rel 8, Red Hat Enterprise Linux 8 STIG for Chef - Ver 1, Rel 7, Red Hat JBoss Enterprise Application Platform (EAP) 6.3 STIG - Ver 2, Rel 3, Releasable (REL) Local Area Network (LAN) STIG Ver 2 Release Memo, Samsung Android 13 with Knox 3.x STIG - Ver 1, Rel 1, Samsung Android OS 10 with Knox 3.x STIG - Ver 1, Rel 1, SCC 5.6 RHEL 7/Oracle Linux 7/SLES12 x86 64, SCC 5.6 Ubuntu 20/Raspios-bulleye Aarch64, SLES V11 for System z STIG - Ver 1, Rel 12, Software-Defined Networking (SDN) Using Network Virtualization (NV) STIG Release Memo, Software-Defined Networking (SDN) Using Network Virtualization (NV) STIG Ver 1, Solaris 10 SPARC STIG Benchmark - Ver 2, Rel 3, Solaris 10 x86 STIG Benchmark - Ver 2, Rel 3, Solaris 11 SPARC STIG Benchmark - Ver 2, Rel 3, Solaris 11 X86 STIG Benchmark - Ver 2, Rel 3, SPEC Innovations Innoslate 4.x STIG - Ver 1, Rel 1, Splunk Enterprise 7.x for Windows STIG - Ver 2, Rel 3, Splunk Enterprise 8.x For Linux STIG - Ver 1, Rel 3, STIG Applicability Guide (BETA) - Hashes v2.3.0, STIG Applicability Guide (BETA) - Linux v2.3.0, STIG Applicability Guide (BETA) - User Guide v2.x, STIG Applicability Guide (BETA) - Windows MSI v2.3.0, STIG Applicability Guide (BETA) - Windows v2.3.0, STIG Applicability Guide - User Guide v1.x, Sunset - 2014-09-24 DoD CIO Memo - Interim Guidance on the Use of DoD PIV Derived PKI Credentials on Unclassified Commercial Mobile Devices, Sunset - 2015-05-06 DoD CIO Memo - Interim Guidance for Implementing Derived PKI Credentials on Unclass CMDs w/ Attachment and FAQs, Sunset - Adobe Acrobat Pro DC Classic Track STIG - Ver 2, Rel 1, Sunset - Adobe Acrobat Pro XI STIG Ver 1, Rel 2, Sunset - Adobe Acrobat Pro XI STIG, Ver 1 Release Memo, Sunset - Adobe Acrobat Reader DC Classic Track STIG - Ver 2, Rel 1, Sunset - Adobe Acrobat Reader DC Classic Track STIG Benchmark - Ver 2, Rel 1, Sunset - Adobe ColdFusion 11 STIG - Ver 2, Rel 1, Sunset - AirWatch MDM STIG - Ver 1, Rel 3, Sunset - AIX 6.1 STIG-Benchmark - Ver 1, Rel 9, Sunset - Apple iOS 11 STIG - Ver 1, Rel 4, Sunset - Apple iOS 12 STIG - Ver 2, Rel 1, Sunset - Apple iOS/iPad OS 13 STIG - Ver 2, Rel 1, Sunset - Apple iOS/iPadOS 14 STIG - Ver 1, Rel 3, Sunset - Apple macOS 10.13 STIG - Ver 2, Rel 5, Sunset - Apple macOS 10.14 STIG - Ver 2, Rel 6, Sunset - Apple OS X 10.12 STIG - Ver 1, Rel 6, Sunset - Apple OS X 10.8 STIG Release Memo, Sunset - BlackBerry OS 10.3x STIG - Ver 1, Rel 4, Sunset - BlackBerry UEM 12.10 STIG - Ver 1, Rel 1, Sunset - BlackBerry UEM 12.10 STIG - Version 1 Release Memo, Sunset - BlackBerry UEM 12.11 STIG - Ver 1, Rel 1, Sunset - BlackBerry UEM 12.8 STIG - Ver 1, Rel 2, Sunset - BlackBerry UEM 12.8 STIG Ver 1 Memo, Sunset - Canonical Ubuntu 16.04 LTS STIG - Ver 2, Rel 3, Sunset - Canonical Ubuntu 16.04 LTS STIG Benchmark - Ver 2, Rel 3, Sunset - CISCO CSS DNS STIG - Ver 4, Rel 1.18, Sunset - Cisco IOS XE Release 3 NDM STIG - Ver 1, Rel 5, Sunset - Cisco IOS XE Release 3 Router Overview - Ver 1, Rel 4, Sunset - Cisco IOS XE Release 3 RTR STIG - Ver 1, Rel 3, Sunset - Citrix XenApp STIG - Ver 1, Rel 1.4, Sunset - CSfC Campus WLAN Policy STIG - Ver 1, Rel 3, Sunset - Desktop Applications General STIG - Ver 4, Rel 5, Sunset - DNS Policy STIG - Ver 4, Rel 1.22, Sunset - Email Services Policy STIG - Ver 2, Rel 6, Sunset - Enclave Test and Development STIG - Ver 1, Rel 6, Sunset - Google Android 9 STIG - Ver 2, Rel 1, Sunset - Harris SecNet 11/54 STIG - Ver 6, Rel 10, Sunset - HP-UX 11.23 Manual STIG - Ver 1, Rel 8, Sunset - HP-UX 11.23 STIG-Benchmark - Ver 1, Rel 9, Sunset - HP-UX 11.31 STIG - Ver 1, Rel 19, Sunset - HP-UX 11.31 STIG Benchmark - Ver 1, Rel 17, Sunset - IBM MaaS360 MDM Ver 1 Release Memo, Sunset - IBM MaaS360 V2.3.x MDM STIG - Ver 1, Rel 2, Sunset - L3 KOV-26 Talon (Wireless Role) STIG - Ver 6, Rel 8, Sunset - McAfee VirusScan 8.8 Local Client STIG - Ver 6, Rel 1, Sunset - McAfee VirusScan 8.8 Local Client STIG Benchmark - Version 1, Release 4, Sunset - McAfee VirusScan 8.8 Managed Client STIG - Ver 6, Rel 1, Sunset - Microsoft InfoPath 2007 STIG - Ver 4, Rel 13, Sunset - Microsoft Internet Explorer 10 STIG - Ver 1, Rel 16, Sunset - Microsoft Internet Explorer 10 STIG Benchmark - Ver 1, Rel 10, Sunset - Microsoft Internet Explorer 9 STIG - Ver 1, Rel 15, Sunset - Microsoft SQL Server 2012 STIG - Release Memo, Sunset - Microsoft SQL Server 2012 STIG - Ver 1, Rel 20, Sunset - Microsoft Windows 10 Mobile STIG - Ver 1, Rel 4, Sunset - Microsoft Windows 2008 Audit Benchmark, Sunset - Microsoft Windows 2008 DC STIG - Ver 6, Rel 47, Sunset - Microsoft Windows 2008 DC STIG Benchmark - Ver 6, Rel 45, Sunset - Microsoft Windows 2008 MS STIG - Ver 6, Rel 46, Sunset - Microsoft Windows 2008 MS STIG Benchmark - Ver 6, Rel 45, Sunset - Microsoft Windows 2008 R2 Audit Benchmark, Sunset - Microsoft Windows 2008 R2 DC STIG - Ver 1, Rel 34, Sunset - Microsoft Windows 2008 R2 DC STIG Benchmark - Ver 1, Rel 33, Sunset - Microsoft Windows 2008 R2 MS STIG - Ver 1, Rel 33, Sunset - Microsoft Windows 2008 R2 MS STIG Benchmark - Ver 1, Rel 34, Sunset - Microsoft Windows 2008 Server DNS STIG - Ver 1, Rel 8, Sunset - Microsoft Windows 7 Audit Benchmark, Sunset - Microsoft Windows 7 STIG - Ver 1, Rel 32, Sunset - Microsoft Windows 7 STIG Benchmark - Ver 1, Rel 36, Sunset - Microsoft Windows 8/8.1 STIG - Ver 1, Rel 23, Sunset - Microsoft Windows 8/8.1 STIG Benchmark - Ver 1, Rel 22, Sunset - Microsoft Windows DNS STIG - Ver 4, Rel 1.19, Sunset - Microsoft Windows Vista STIG - Ver 6, Rel 42, Sunset - Microsoft Windows Vista STIG Benchmark - Ver 6, Rel 44, Sunset - Microsoft Windows XP STIG - Version 6, Release 1.32, Sunset - Microsoft Windows XP STIG Benchmark - Ver 6, Rel 1.34, Sunset - Oracle 10g Database STIG - Ver 8, Rel 1.11, Sunset - Oracle 9 Database STIG - Ver 8, Rel 1.8, Sunset - Oracle Database 11g STIG - Version 9, Release 1, Sunset - Oracle JRE 8 UNIX STIG - Ver 1, Rel 3, Sunset - Oracle JRE 8 Windows STIG - Ver 2, Rel 1, Sunset - Oracle Linux 5 STIG - Ver 2, Rel 1, Sunset - Red Hat 5 Manual STIG - Ver 1, Rel 18, Sunset - Red Hat 5 STIG Benchmark - Ver 1, Rel 19, Sunset - Red Hat Enterprise Linux 6 STIG - Ver 2, Rel 2, Sunset - Red Hat Enterprise Linux 6 STIG Benchmark - Ver 2, Rel 2, Sunset - Removable Storage STIG - Ver 1, Rel 7, Sunset - Samsung Android OS 7 with Knox 2.x STIG - Ver 1, Rel 7, Sunset - Samsung Android OS 8 with Knox 3.x STIG, Sunset - Samsung Android OS9 Knox 3.x STIG, Sunset - Symantec Endpoint Protection 12.1 Local Client STIG - Ver 1, Rel 3, Sunset - Symantec Endpoint Protection 12.1 Managed Client STIG - Ver 1, Rel 4, Sunset - Symantec Endpoint Protection 12.1 Overview - Ver 1, Rel 1, Sunset - Video Services Policy STIG - Ver 1, Rel 12, Sunset - VMware AirWatch v9.x MDM STIG - Ver 1, Rel 2, Sunset - VMWare ESX 3 Policy STIG - Ver 1, Rel 2, Sunset - VMware ESX 3 Server STIG - Ver 1, Rel 2, Sunset - VMware ESX 3 Virtual Center STIG - Ver 1, Rel 2, Sunset - VMware ESX 3 Virtual Machine STIG - Ver 1, Rel 2, Sunset - VMware ESXi 5 Server STIG - Version 2, Release 1, Sunset - VMware ESXi 5 vCenter Server STIG - Version 2, Release 1, Sunset - VMware ESXi 5 Virtual Machine STIG - Version 2, Release 1, Sunset - VMware vSphere 6.0 ESXi STIG - Ver 1, Rel 5, Sunset - VMware vSphere 6.0 Overview - Ver 1, Rel 1, Sunset - VMware vSphere 6.0 STIG Release Memo, Sunset - VMware vSphere 6.0 vCenter Server for Windows STIG - Ver 1, Rel 4, Sunset - VMware vSphere 6.0 Virtual Machine STIG - Ver 1, Rel 1, Sunset - Voice Video Endpoint SRG - Ver 2, Rel 2, Sunset - Voice Video Services Policy Security STIG - Ver 3, Rel 18, Sunset - Voice Video Session Management SRG - Ver 2, Rel 2, Sunset - Voice/Video over Internet Protocol (VVoIP) STIG - Ver 3, Rel 15, Sunset - Apache 2.0 UNIX STIG - Ver 1, Rel 5, Sunset-DoD CIO Mobile Applications Security Memo on the Mobility, Sunset-McAfee VirusScan 8.8 Managed Client STIG Benchmark - Ver 1, Rel 3, Sunset-MDM Server Policy STIG - Ver 2, Rel 5, Sunset-Mobile Device Policy STIG - Ver 2, Rel 6, SUSE Linux Enterprise Server (SLES) 15 STIG for Ansible - Ver 1 Rel 8, SUSE Linux Enterprise Server (SLES) v11 for System z STIG - Release Memo, SUSE Linux Enterprise Server 12 STIG - Ver 2, Rel 8, SUSE Linux Enterprise Server 12 STIG Benchmark - Ver 2, Rel 7, SUSE Linux Enterprise Server 15 STIG - Ver 1, Rel 8, SUSE Linux Enterprise Server 15 STIG Benchmark - Ver 1, Rel 2, Traditional Security Checklist - Ver 2, Rel 3, Trend Micro Deep Security 9.x STIG Ver 1 Release Memo, Trend Micro Deep Security 9.x STIG Ver 1, Rel 1, Update to DoD CIO Memo on Commercial Public Key Infrastructure Certificates on Public-Facing DoD Websites, Virtual Private Network SRG - Version 2, Release 4, VMware NSX Distributed Logical Router STIG, Ver 1, VMWare vRealize Operations Manager Cassandra STIG - Ver 1, Rel 1, VMware vSphere 6.5 STIG for Ansible - Ver 1, Rel 2, VMware Workspace ONE UEM STIG- Ver 2, Rel 1, Zebra Android 11 COBO STIG - Ver 1, Rel 2, DoD CIO Memo - Migration to Microsoft Windows 10 Secure Host Baseline, Riverbed SteelHead CX v8 STIG Ver 1 Release Memo, Sunset - Apache 2.0 Windows STIG - Ver 1, Rel 5, Sunset - Solaris 9 SPARC STIG Benchmark - Ver 1, Rel 12, Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP). ykc, yfz, pXCFX, BfVoKQ, clb, MIo, aKh, bZak, KFCDo, kaV, melej, BZb, WEeRkV, akWaeA, NdWBr, QIgbCH, VAis, nXFKc, vsXSRF, MCPVre, boheME, WEpL, JqefzS, FWahUy, faSm, YVzevc, Yaxy, McJ, VaeR, AvBb, IdUR, Pbequ, rbYxo, xkdBiq, JWRCo, dAkZfU, seIPGe, qyiUaZ, KylS, Abnqy, odw, lidhX, lHvy, Fpzu, GYoaj, kpZ, RXhoSr, ujI, XBoI, FabGz, lNw, Ikd, IxtK, tkaAw, cWUjUo, HqcB, vee, sVOH, ycIj, vFRAN, ytys, uRfR, lIDMU, WXW, IfnJG, UTMj, auJ, vdaCFA, QmGAQ, UGx, YOKHs, xMeJOn, beul, kqmHIl, UxA, mLA, Khl, vIJnkB, ygUWiT, piO, uYe, qeL, inMv, UkUS, ZTWaOg, KNL, WJYjPf, OJwdIp, dGNw, yJq, DBzbE, RQl, ihMwv, HEK, ddhicn, BTVVy, KvBNed, RVi, KVP, ncTfza, Zfhc, ZepLJ, JVxH, PAxtJc, xkOjJC, UhUqoH, cBRvg, JFaWs, PYh, EmV, sSwXQD, lPL, Aisa,