- Update Powerstig to parse\apply Oracle Linux 8 STIG - Ver 2, Rel 1 #1380
- Update Powerstig to parse\apply Microsoft Windows Server 2019 STIG - Ver 3, Rel 1 #1369
- Update Powerstig to parse\apply Microsoft Windows Server 2022 STIG - Ver 2, Rel 1 #1370
- Update Powerstig to parse\apply U_MS_SQL_Server_2016_Instance_V3R1_Manual_STIG #1373
- Update Powerstig to parse\apply Microsoft IIS 10.0 Server STIG #1371
- Update Powerstig to parse\apply Microsoft Office 365 ProPlus STIG - Ver 3, Rel 1 #1372
- Update Powerstig to parse\apply Microsoft Windows 11 STIG - Ver 2, Rel 1 #1368
- Update Powerstig to parse\apply Microsoft Windows 10 STIG - Ver 3, Rel 1 #1366
- Update Powerstig to parse/apply Microsoft Edge STIG - Ver 2, Rel 1 #1364
- Update Powerstig to parse/apply Microsoft Edge STIG - Ver 1, Rel 8 #1350
- Update PowerSTIG to Parse/Apply Microsoft Windows 11 STIG - Ver 1, Rel 6 #1341
- Update PowerSTIG to Parse/Apply Microsoft Windows 10 STIG - Ver 2, Rel 9 #1342
- Update PowerSTIG to Parse/Apply Microsoft Windows Server 2016 STIG - Ver 2, Rel 8 #1340
- Update PowerSTIG to Parse/Apply Microsoft Windows Server 2019 STIG - Ver 2, Rel 9 #1339
- Update PowerSTIG to Parse/Apply Microsoft Windows Server 2022 STIG - Ver 1, Rel 5 #1337
- Update Powerstig to parse/apply Microsoft Office System 2016 STIG - Ver 2, Rel 3 #1352
- Update Powerstig to parse/apply Microsoft Office 365 ProPlus STIG - Ver 2, Rel 12 #1351
- Update Powerstig to parse/apply Microsoft .Net Framework 4.0 STIG - Ver 2, Rel 4 #1349
- Update Powerstig to parse/apply U_MS_SQL_Server_2016_Instance_V2R12 #1348
- Update Powerstig to parse/apply Canonical Ubuntu 18.04 LTS STIG - Ver 2, Rel 14 #1347
- Update Powerstig to Parse/Apply U_Google_Chrome_V2R9_STIG #1317
- Update PowerSTIG to Parse/Apply Internet Explorer 11 V2R5 #1323
- Update PowerSTIG to Parse/Apply Microsoft .NET 4 V2R2 #1325
- Update Powerstig to Parse/Apply U_MS_SQL_Server_2016_Instance_V2R11_Manual_STIG #1321
- Update Powerstig to Parse/Apply U_CAN_Ubuntu_18-04_LTS_V2R13_STIG #1319
- Fix for Invalid value for V-221588 in default Chrome organizational settings #1329
- Update PowerSTIG to Parse/Apply U_RHEL_7_V3R14_STIG #1315
- Update Powerstig to Parse/apply Microsoft OneNote 2016 STIG V1R2 #1303
- Update Powerstig to Parse/apply Microsoft Skype for Business 2016 STIG V1R1 #1305
- Update Powerstig to Parse/apply Microsoft Access 2016 STIG V1R1 #1307
- Update Powerstig to correct Filename for Microsoft OneNote 2016 STIG V1R1 #1309
- Update PowerSTIG to Parse/Apply U_MOZ_Firefox_STIG_V6R5 #1256
- Update PowerSTIG to Parse/Apply U_MS_Windows_Server_2019_V2R8_STIG #1276
- Update PowerSTIG to Parse/Apply U_MS_Windows_Server_2022_V1R4_STIG: #1277
- Update PowerSTIG to Parse/Apply U_MS_Windows_Server_2016_V2R7_STIG #1275
- Update PowerSTIG to Parse/Apply U_RHEL_7_V3R13_STIG: #1283
- Update PowerSTIG to Parse/Apply U_CAN_Ubuntu_18-04_LTS_V2R12_STIG: #1278
- Update PowerSTIG to Parse/Apply Microsoft IIS 10.0 STIG Server V2R10 Site V2R9: #1280
- Update PowerSTIG to Parse/Apply U_MS_IIS_10-0_Y23M10_STIG: #1280
- Update GPRegistryPolicyDSC to version 1.3.1: #1284
- Fix for Chrome issue Registry Path is incorrect #1215
- Update PowerSTIG to Parse/Apply U_MS_Office_365_ProPlus_V2R11_STIG: #1281
- Update PowerSTIG to Parse/Apply U_MS_Windows_11_V1R5_STIG: #1273
- Update PowerSTIG to Parse/Apply U_MS_Windows_Firewall_STIG_V2R2_STIG: #1274
- Update PowerSTIG to Parse/Apply Red Hat Enterprise Linux 7 STIG V3R12: #1254
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus V2R10 #1259: #1221
- Update PowerSTIG to Parse/Apply SQL Server 2016 Instance STIG V2R10: #1257
- Update PowerSTIG to Parse/Apply MS_Edge_V1R7_STIG: #1255
- Update PowerSTIG to Parse/Apply Microsoft IIS 10.0 STIG Server V2R9 Site V2R8: #1242
- Update PowerSTIG to Parse/Apply Microsoft IIS 8.5 Site V2R8 #1241
- Update PowerSTIG to Parse/Apply SQL Server 2016 Instance STIG V2R9: #1245
- Update PowerSTIG to Parse/Apply Windows Server 2022 STIG V1R3: #1231
- Update PowerSTIG to Parse/Apply Windows Server 2019 STIG V2R7: #1230
- Update PowerSTIG to Parse/Apply Microsoft Windows 11 STIG V1R4: #1232
- Update PowerSTIG to Parse/Apply Microsoft Windows 10 STIG V2R7: #1233
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus V2R9 #1221: #1221
- Update PowerSTIG to Parse/Apply Windows Server 2019 STIG V2R6 #1219
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus V2R9 #1221: #1221
- Update PowerSTIG to Parse/Apply SQL Server 2016 Instance STIG V2R9: #1223
- Update PowerSTIG to Parse/Apply Red Hat Enterprise Linux 7 STIG V3R11: #1243
- Update PowerSTIG to Parse/Apply CAN_Ubuntu_18-04_LTS_V2R11_STIG: #1239
- Update PowerSTIG to Parse/Apply Red Hat Enterprise Linux 7 STIG V3R10: #1193
- Update PowerSTIG to Parse/Apply CAN_Ubuntu_18-04_LTS_V2R10_STIG: #1191
- Update PowerSTIG to Parse/Apply Microsoft IIS 10.0 STIG V2R8: #1196
- Update PowerSTIG to Parse/Apply Google Chrome V2R8 #1192
- Update PowerSTIG to Parse/Apply Microsoft IIS 8.5 Site V2R7 & Server STIG V2R5 #1195
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus V2R8 #1194: #1194
- Update PowerSTIG to Parse/Apply Microsoft Windows Server 2022 V1R1 STIG - Ver 1, Rel 1: #1190
- Update Readme to reflect all covered technologies #1184
- Update PowerSTIG to Parse/Apply Canonical Ubuntu 18.04 LTS STIG - Ver 2, Rel 9: #1164
- Update PowerSTIG to Parse/Apply Red Hat Enterprise Linux 7 STIG V3R9: #1179
- Upgrade AccessControlDSC to Version 1.4.3 #1151
- Update PowerSTIG to Parse/Apply Microsoft IIS 10.0 STIG V2R7: #1175
- Update PowerSTIG to Parse/Apply Google_Chrome_V2R7_STIG: #1160
- Update PowerSTIG to Parse/Apply Windows Server 2019 V2R5 STIG - Ver 2, Rel 5: #1159
- Update PowerSTIG to Parse/Apply Windows_Server_2016_V2R5_STIG #1158
- Update PowerSTIG to Parse/Apply Microsoft .Net Framework 4.0 STIG - Ver 2, Rel 2: #1181
- Update PowerSTIG to Parse/Apply SQL Server 2016 Instance STIG V2R8: #1177
- Update PowerSTIG to Parse/Apply MS_Edge_V1R6_STIG: #1163
- Update PowerSTIG to Parse/Apply MS_Office_365_ProPlus_V2R7_STIG #1161: #1161
- Update PowerSTIG to successfully parse/apply Microsoft Windows 10 STIG - Ver 2, Rel 5: #1157
- Update PowerSTIG to successfully parse/apply Microsoft Windows 11 STIG - Ver 1, Rel 2: #1131
- Update PowerSTIG to Parse/Apply Red Hat Enterprise Linux 7 STIG - Ver 3, Rel 8: #1151
- Update PowerSTIG to Parse/Apply Canonical Ubuntu 18.04 LTS STIG - Ver 2, Rel 8: #1140
- Update PowerSTIG to successfully parse/apply Microsoft Edge STIG - Ver 1, Rel 5 : #1145
- Update PowerSTIG to successfully parse/apply Microsoft Internet Explorer 11 STIG - Ver 2, Rel 2 : #1143
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus STIG - Ver 2, Rel 6: #1138
- Update PowerSTIG to Parse/Apply Microsoft IIS 8.5 Server STIG V2R4 : #1142
- Update PowerSTIG to Parse/Apply Microsoft IIS 8.5 Site STIG V2R6 : #1136
- Update PowerSTIG to Parse/Apply Microsoft IIS 10.0 Site\Server STIG V2R6 : #1134
- Add Support for Microsoft Publisher 2016 V1R3 : #1127
- Make LegalNoticeText a default organizational setting : #1093
- PowerSTIG Convert should add newline to raw Xccdf to ensure Pester tests Pass : #1118
- Fixed:Split-BenchmarkId returns the wrong value for Windows Defender V2R4 #1121
- Fixed: Add Org Default Settings to 2019/2016 #1120
- Update PowerSTIG to successfully parse/apply Microsoft Windows 10 STIG - Ver 2, Rel 4: #1096
- Update PowerSTIG to parse/apply RHEL 7.x STIG - Ver 3, Rel 7 #1083
- Update PowerSTIG to successfully parse/apply Canonical Ubuntu 18.04 LTS STIG - V2R7: #1082
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2019 STIG - Ver 2, Rel 4: #1101
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2016 STIG - Ver 2, Rel 4: #1100
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 Server DNS STIG - Ver 2, Rel 5: #1099
- Update PowerSTIG to parse/convert the Windows Server 2012 R2 MS/DC V3R4: #1097
- Update PowerSTIG to successfully parse/apply Microsoft Windows Defender Antivirus STIG - Ver 2, Rel 4: #1095
- Update PowerSTIG to Parse/Apply Microsoft SQL Server 2016 Instance STIG, Version 2, Release 7: #1081
- Update PowerSTIG to successfully parse/apply Microsoft Outlook 2016 Version 2; Release 3: #1079
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus STIG - Ver 2, Rel 5: #1078
- Update PowerSTIG to Parse/Apply Google Chrome STIG - Ver 2, Rel 6: #1077
- Fixed: Linux STIGs have 2 bugs #1090
Fixed: SQL 2016 STIGs are failing integration tests: #1073
- Update PowerSTIG to successfully parse/apply Microsoft Outlook 2016 Version 2; Release 2: #1039
- Update SQL Server 2016 for duplicate FIPS ID's #1027
- Update SQL Server audit coverage #1038
- Update PowerSTIG to Parse/Apply Google Chrome STIG - Ver 2, Rel 5: #1042
- Update PowerSTIG to Parse/Apply Microsoft Office 365 ProPlus STIG - Ver 2, Rel 4: #1044
- Update PowerSTIG to Parse/Apply Microsoft IIS 8.0 Site STIG V2R5: #1047
- Update PowerSTIG to Parse/Apply Microsoft IIS 10.0 Site\Server STIG V2R5: #1046
- Update PowerSTIG to Parse/Apply Microsoft Edge STIG - Ver 1, Rel 4: #1043
- Update PowerSTIG to Parse/Apply Microsoft Office System 2016 STIG - Ver 2, Rel 2: #1045
- Update PowerSTIG to successfully parse/apply Canonical Ubuntu 18.04 LTS STIG - V2R6: #1057
- Fixed: Default Org Settings missing from WindowsServer-2016-DC-2.3.org.default.xml: #1054
- Fixed: RHEL V3R5 Rule V-250314 does not apply successfully: #1041
- Update PowerSTIG to parse/apply RHEL 7.x STIG - Ver 3, Rel 6 #1056
- Update PowerSTIG to Parse/Apply Microsoft SQL Server 2016 Instance STIG, Version 2, Release 3: #1050
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2016 STIG - Ver 2, Rel 3: #1010
- Fixed nxFile entries contain a 'Contents' property that prevents reaching desired state: #1003
- Update PowerSTIG to successfully parse/apply RHEL V3R5 STIG: #1003
- Update PowerSTIG to parse/apply Microsoft Internet Explorer 11 STIG V2R1: #982
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2019 STIG - Ver 2, Rel 3: #1009
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 and 2012 R2 MS STIG - Ver 3, Rel 3: #1015
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 and 2012 R2 DC STIG- Ver 3, Rel 3: #1016
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 Server Domain Name System STIG - Ver 2, Rel 4: #1014
- Update PowerSTIG to successfully parse/apply Microsoft Windows Defender Antivirus STIG - Ver 2, Rel 3: #1013
- Update PowerSTIG to successfully parse/apply Microsoft Windows Firewall STIG and Advanced Security STIG - Ver 2, Rel 1: #1012
- Update PowerSTIG to successfully parse/apply Microsoft Windows 10 STIG - Ver 2, Rel 3: #1017
- Update PowerSTIG for increased SQL Server STIG coverage #965
- Update PowerSTIG to AccessControlDSC v1.4.2: #976
- Update PowerSTIG to successfully parse/apply Microsoft IIS 10.0 SITE/SERVER STIG - Ver 2, Rel 4: #980
- Update PowerSTIG to successfully parse/apply Canonical Ubuntu 18.04 LTS STIG - V2R5: #1003
- Update PowerSTIG to successfully parse/apply VMware 6.5 ESXI V2R3 STIG: #984
- Update PowerSTIG to successfully parse/apply SQL Server 2016 Instance STIG- Ver 2, Rel 5: #983
- Update PowerSTIG to successfully parse/apply Microsoft IIS 8.5 Server STIG - Ver 2, Rel 3: #995
- Update PowerSTIG to successfully parse/apply Microsoft IIS 8.5 SITE STIG - Ver 2, Rel 4: #981
- Update PowerSTIG to successfully parse/apply Microsoft Edge STIG - Ver 1, Rel 3 #979
- Update azure-pipelines.yml update Ubuntu version: #987
- Update PowerSTIG to use SQLServerDSC Version 15.1.1: #960
- Update PowerSTIG to use WindowsDefenderDSC 2.2.0: #1004
- Fixed: Windows Server 2019 V2R1 V-205763 generating an exception #827
- Fixed: PowerSTIG should honor Boolean with all composite resources #969
- Update PowerSTIG to Parse/Apply SQL Server 2016 Instance V2R4 STIG: #959
- Update PowerSTIG to successfully parse/apply Microsoft Office 365 ProPlus STIG - Ver 2, Rel 3: #944
- Update PowerSTIG to test for N-2 STIGs and Stale Log File Entries #951
- Update PowerSTIG to include a method to Reverse PowerSTIG configuration #835
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 Server Domain Name System STIG - Ver 2, Rel 3: #948
- Update PowerSTIG to successfully parse/apply Canonical Ubuntu 18.04 LTS STIG - Ver 2, Rel 4 #956
- Update PowerSTIG to successfully parse/apply VMware vSphere 6.5 STIG V2R2: #942
- Update PowerSTIG to successfully parse/apply Microsoft IIS 10.0 V2R3 SERVER STIG: #940
- Update PowerSTIG to successfully parse/apply Microsoft IIS 8.5 SITE STIG V2R3: #935
- Update PowerSTIG to successfully parse/apply Microsoft Edge STIG - Ver 1, Rel 2: #887
- Update PowerSTIG to successfully parse/apply Red Hat Enterprise Linux 7 STIG - Ver 3, Rel 4: #954
- Update PowerSTIG to successfully parse/apply Google Chrome STIG - Ver 2, Rel 4: #931
- Update PowerSTIG to successfully parse/apply Microsoft IIS 10.0 V2R3 Site STIG: #937
- Update PowerSTIG to successfully parse/apply Mozilla Firefox STIG - Ver 5, Rel 2 : #933
- Update PowerSTIG to successfully parse/apply Microsoft Office System 2016 STIG - Ver 2, Rel 1: #946
- Update PowerSTIG to successfully parse/apply Adobe Acrobat Pro DC Continuous Track STIG - Ver 2, Rel 1: #950
- Update PowerSTIG to successfully parse/apply Adobe Acrobat Reader DC Continuous Track STIG - Ver 2, Rel 1: #929
- Fixed: V-241788 fails to apply due to invalid registry key #918
- Fixed: Increase SQL Server 2016 Instance Coverage #922
- Update PowerSTIG to parse and apply Ubuntu 18.04 LTS STIG - Ver 2, Rel 3: #912
- Update PowerSTIG to successfully parse/apply Microsoft Office 365 ProPlus STIG - Ver 2, Rel 2: #887
- Update PowerSTIG to successfully parse/apply Windows 10 STIG V2 R2: #891
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 R2 DC STIG- Ver 3, Rel 2 #902
- Update PowerSTIG to successfully parse/apply Microsoft IIS 10.0 SITE/SERVER STIG V2R2: #882
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 Server Domain Name System STIG - Ver 2, Rel 2 #896
- Update PowerSTIG to successfully parse/apply SQL Server 2016 Instance STIG- Ver 2, Rel 3 #905
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 R2 MS STIG - Ver 3, Rel 2 #900
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2016 DC/MS Ver 2, Rel 2: #897
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2019 STIG - Ver 2, Rel 2: #893
- Update PowerSTIG to successfully parse/apply Red Hat Enterprise Linux 7 STIG - Ver 2, Rel 2: #888
- Update PowerSTIG to successfully parse/apply Microsoft IIS 8.5 SITE/SERVER STIG - V2R2: #884
- Update PowerSTIG to successfully parse/apply Google Chrome Ver 2, Rel 2: #876
- Update PowerSTIG to remove old rule Ids in Hard Coded Framework: #864
- Update PowerSTIG to successfully add SQL Server 2016 vulnerability IDs: #872
- Fixed: PowerShell v7 Fix: AccessControlDsc/RegistryAccessEntry & NTFSAccessEntry "AccessControlList" should be an Array
- Fixed: Validation test fail because TABs are found in Description Field #878
- Update PowerSTIG to remove old rule Ids in Hard Coded Framework: #790
- Update PowerSTIG to Parse/Apply MS Office 365 ProPlus Ver 2, Rel 1: #811
- Update PowerSTIG to parse and apply RHEL 7.x V3R1: #608
- Update PowerSTIG to parse and apply Ubuntu 18.04 LTS STIG - Ver 2, Rel 2: #821
- Update PowerSTIG to Add Checklist Accountability: #808
- Update PowerSTIG to move O365 Pro Plus log entries into Exclusion Rule list: #815
- Update PowerSTIG to parse and apply Mozilla Firefox V5R1 STIG: #834
- Update PowerSTIG to parse and apply Microsoft DotNet V2R1 STIG: #831
- Update PowerSTIG to Parse/Apply Oracle JRE 8 Ver 2, Rel 1: #833
- Update PowerSTIG to use WindowsDefenderDSC 2.1.0: #822
- Update PowerSTIG to Parse/Apply Google Chrome Ver 2, Rel 2: #841
- Update PowerSTIG SkipRule to Accept Parent Rule for Split Rules: #846
- Update PowerSTIG to successfully parse/apply Microsoft SQL Server 2016 Instance Version 2; Release 2: #838
- Update PowerSTIG to successfully parse/apply MS Edge V1R1: #860
- Update PowerSTIG to successfully parse/apply VMware 6.5 ESXI V2R1 STIG: #851
- Fixed: RHEL RuleId V-204406 should be removed: #847
- Fixed: ConvertTo-ManualCheckListHashTable function call is missing mandatory argument: #823
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 and 2012 R2 DC STIG - Ver 3, Rel 1: #784
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 and 2012 R2 MS STIG - Ver 3, Rel 1: #785
- Update PowerSTIG to successfully parse/apply Microsoft Windows 10 STIG - Ver 2, Rel 1: #783
- Update PowerSTIG to successfully parse/apply Microsoft Windows Defender Antivirus STIG - Ver 2, Rel 1: #786
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2016 STIG - Ver 2, Rel 1: #782
- Update PowerSTIG to successfully parse/apply Microsoft Windows Server 2019 STIG - Ver 2, Rel 1 #787
- Update PowerSTIG to successfully parse/apply Google Chrome V2R1: #709
- Update PowerSTIG to include LegacyId to assist in determining Legacy Vuln Ids with the new DISA standard: #788
- Update PowerSTIG to include LegacyId query via Get-StigRule function: #800
- Fixed: Update PowerSTIG to fix LegacyId logic: #791
- Fixed: Update PowerSTIG to correctly parse Windows Server 2019 DC - LDAP SecurityOptionRule: #804
- Provide Method to install DoD Root Certs for Server OS and Client OS: #755
- Update Windows 10 Client STIGs based on ACAS results: #778
- Update PowerSTIG to Provide Rule Data from Processed xml: #747
- Update PowerSTIG to send a warning to the user when using a composite that leverages the new DISA Ids: #772
- Update PowerSTIG to successfully parse/apply Microsoft Office System 2013 STIG - Ver 2, Rel 1: #769
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 Server DNS STIG - Ver 2, Rel 1: #760
- Update PowerSTIG to successfully parse/apply Microsoft SQL Server 2016 Instance Version 2; Release 1: #761
- Update PowerSTIG to successfully parse/apply Microsoft Outlook 2016 Version 2; Release 1: #767
- Update spacing in DoD logon script: #757
- Update PowerSTIG to Increase Code Coverage of Unit Tests: #737
- Update PowerSTIG with new SkipRuleSeverity Parameter to skip entire STIG Category/Severity Level(s): #711
- Update PowerSTIG to successfully parse/apply Microsoft IIS 10 SITE/SERVER STIG - Ver 2, Rel 1: #759
- Update PowerSTIG to successfully parse/apply IIS 8.5 Site/Server V2R1 STIGs: #762
- Fixed #746: Functions.Checklist Manual Checks need to leverage psd1 files - Backward Compat Issue
- Update PowerSTIG to successfully parse/apply Windows 2012 R2 DC Version 2, Rev 21: #677
- Update PowerSTIG to successfully parse/apply IIS Site/Server V1R11 STIGs: #702
- Update PowerSTIG to successfully parse/apply Microsoft Internet Explorer 11 STIG - Ver 1, Rel 19: #707
- Update PowerSTIG to successfully parse/apply Microsoft Windows 2012 Server DNS - V1R15: #696
- Update PowerSTIG to successfully parse/apply SQL Server 2016 Instance V1R10: #704
- Update PowerSTIG to successfully parse/apply IIS 10.0 Site/Server V1R2 STIGs: #699
- Update PowerSTIG to successfully parse Microsoft Windows 10 STIG - Ver 1, Rel 23: #678
- Update PowerSTIG to successfully parse/apply Windows Server 2019 Instance Ver. 1 Rel. 5: #683
- Update PowerSTIG to successfully parse/apply Windows 2016 DC/MS Version 1, Rev 12: #681
- Update PowerSTIG to successfully parse/apply Windows 2012 R2 MS Version 2, Rev 19: #676
- Update PowerSTIG To Use WindowsDefenderDsc version 2.0.0 : #657
- Update PowerSTIG To Use PSDSCResources version 2.12.0.0: #723
- Update PowerSTIG To Use AuditPolicyDsc version 1.4.0.0 : #715
- Update PowerSTIG To Use xWebAdministration version 3.2.0 : #713
- Update PowerSTIG To Use xDnsServer version 1.16.0.0: #695
- Update PowerSTIG To Use SecurityPolicyDsc version 2.10.0.0: #690
- Update PowerSTIG To Use FileContentDsc version 1.3.0.151: #722
- Update PowerSTIG To Use ComputerManagementDsc version 8.4.0: #720
- Update PowerSTIG to support multiple STIGs per checklist #567
- Release Process Update: Ensure the nuget package uses explicit DSC Resource Module Versions: #667
- Fixed #668: Incorrect key for SSL 3.0 rules in SqlServer-2016-Instance.*.xml
- Fixed #669: Missing TLS 1.2 configuration for rule V-97521
- Fixed #663: Missing OrgSettings for V-88203 - Win10 Client 1.19 and 1.21
- Fixed #673: IIS Sever 10.0 STIG hardening rule V-100163 fails with error in Windows Server 2019 while using PowerSTIG 4.4.2
- Fixed: Removed Windows Server 2016 DC/MS R1V9 from processed STIGs folder
- Fixed #718: Allow application of applicable user rights assignments for non-domain and disconnected systems
- Fixed #731: Update Windows 10 Client Org Default Setting For Rule V-63405 to "15"
- Fixed #735: Rule V-63353 won't reach desired state if system partition is Fat32
- Removed required dependency of Vmware.VsphereDSC due to cyclic redundancy error when importing PowerSTIG
- Update PowerSTIG to successfully parse/apply MS SQL Server 2012 Instance Ver. 1 Rel. 20: #639
- Update PowerSTIG to successfully parse/apply MS SQL Server 2016 Instance Ver. 1 Rel. 9: #636
- Update PowerSTIG to successfully parse/apply Windows Server 2012 DNS STIG - Ver 1, Rel 14: #633
- Update PowerSTIG to successfully parse Microsoft IIS Server/Site 10.0 STIG STIG V1R1: #632
- Update PowerSTIG to successfully parse Microsoft Visio 2013 STIG V1R4: #629
- Update PowerSTIG to successfully parse/apply Windows Defender Antivirus STIG - V1R8: #625
- Update PowerSTIG to successfully parse Microsoft SQL Server 2012 Database STIG V1R20: #618
- Update PowerSTIG to successfully parse/apply Microsoft IIS Server/Site 8.5 STIG - Ver 1, Rel10: #622
- Update PowerSTIG to use Azure Pipelines and DSC Community based build logic: #600
- Update PowerSTIG to parse/convert the Vmware Vsphere 6.5 STIG V1R3: #604
- Update PowerSTIG to parse/convert the Vmware Vsphere 6.5 STIG V1R4: #634
- Fixed #647: Conflict when configuring multiple databases
- Fixed #616: Unable to Import PowerSTIG 4.4.0 Due to cyclic dependency Error
- Fixed #632: Update PowerSTIG to allow for workgroup level scansr
- Fixed #652: Invalid ValueName for InternetExplorer11 rules V-75169 and V-75171
- Update PowerSTIG to Expand .NET STIG Automation: #591
- Update PowerSTIG to parse and apply McAfee VirusScan 8.8 Local Client STIG V5R16: #588
- Update PowerSTIG to successfully parse Microsoft SQL Server 2016 Instance STIG - Ver 1, Rel 8: #586
- Update PowerSTIG to parse and apply Windows Server 2019 V1R3 STIG: #584
- Update PowerSTIG to parse/convert the Windows Server 2016 V2R10: #582
- Update PowerSTIG to parse/convert the Windows Server 2012 DNS STIG V1R13: #580
- Update PowerSTIG to parse/convert the Windows Server 2012 R2 DC V2R19: #578
- Update PowerSTIG to parse/convert the Windows Defender STIG V1R7: #576
- Update PowerSTIG to successfully parse Mozilla Firefox STIG - Ver 4, Rel 28: #573
- Update PowerSTIG to parse and apply Adobe Acrobat Reader Version 1, Release 6: #562
- Update PowerSTIG release process to include STIG Coverage markdown wiki automation: #560
- Update PowerSTIG to show duplicate rule status matching in a checklist: #257
- Fixed #589: Update module manifest to leverage GPRegistryPolicyDsc v1.2.0
- Fixed #569: Update SqlServerDsc module version references
- Fixed #259: Checklist .ckl file fails XML validation in Stig Viewer 2.8.
- Fixed #527: Checklist is not using manualcheckfile when using DscResult.
- Fixed #548: Target/host data is blank when creating a new checklist.
- Fixed #546: Typecast causing an issue when trying to generate checklist using New-StigChecklist function.
- Fixed #401: Checklists generated by New-StigChecklist do not provide finding details.
- Fixed #593: Update PowerSTIG Convert naming conventions of output STIGs
- Update PowerSTIG parsing for IIS 8.5 STIG - Ver 1, Rel 9: #530
- Update PowerSTIG to successfully parse Microsoft .Net Framework STIG 4.0 STIG - Ver 1, Rel 9: 535
- Update PowerSTIG to successfully parse MS Internet Explorer 11 STIG - Ver 1, Rel 18: #538
- Update PowerSTIG to successfully parse Mozilla Firefox STIG - Ver 4, Rel 27: #540
- Update PowerSTIG to successfully parse Microsoft Windows 10 STIG - Ver 1, Rel 19: 533
- Update PowerSTIG to parse/convert the Windows Server 2012 R2 MS/DC V2R17/V2R18 Respectively: 531
- Update PowerSTIG to successfully parse Microsoft SQL Server 2016 Instance STIG - Ver 1, Rel 7: #542
- Update PowerSTIG to parse and apply OfficeSystem 2013 STIG V1R9 / 2016 V1R1: #551
- Update PowerSTIG to parse and apply Windows Server 2019 V1R2 STIG: #554
- Fixed #428: Updated JRE rule V-66941.a to be a Organizational setting
- Fixed #427: Windows 10 Rule V-63373 fails to apply settings to system drive
- Fixed #514: Feature request: additional support for servicerule properties
- Fixed #521: Organizational setting warning should include Stig name
- Fixed #443: Missing cmdlet Get-StigXccdfBenchmark function
- Fixed #528: New-StigChecklist should not require a ManualCheckFile
- Fixed #545: Need a test to verify the conversionstatus="fail" does not exist in processed STIGs
- Fixed #517: Need a test to verify the module version in the module manifest matches the DscResources.
- Fixed #517: 4.1.0 GPRegistryPolicyDsc Module Version Issue
- Update PowerSTIG to enable Exception Parameter Backward Compatibility Feature Request: 506
- Update Enable Stig Checklist automation to include Status and Comments for manual checks: #485
- Update PowerSTIG parsing for Windows Sever 2016 STIG - Ver 1, Rel 9 #498
- Fixed #507: Get-HardCodedRuleLogFileEntry Errors on RegistryRule
- Update PowerSTIG to leverage the GPRegistryPolicyDsc resource for Local Group Policy automation: #497
- Update PowerSTIG to enable the logfile framework to consume a hashtable for HardCodedRule: #494
- Update PowerSTIG to pass OrgSettings in via configuration hashtable: #372
- Update support for SQL Server 2012 Database STIG, Version 1, Release 19 #482
- Fixed #478: SQL STIG Instance V-40936 Fails to apply
- Update PowerSTIG to automate applying the IIS 8.5 STIG, Version 1 Release 8. #469
- Fixed #476: AuditSetting Rule for Windows STIGs has an incorrect operator when evaluating Service Pack information
- Added support for Dot Net Framework 4.0 STIG, Version 1, Release 8 #447
- Added support for Windows 10 STIG, Version 1, Release 17 & 18: #466
- Added support for Windows 2012 Server DNS STIG, Version 1, Release 12 #464
- Update PowerSTIG to automate applying the Windows Server 2012R2 DC & MS STIG, Version 2, Release 17 & 16 respectively. #456
- Fixed #444: Duplicate principals in Permission Rule (Registry)
- Updated logfile in 2012R2 DC STIG leveraging HardCodedRule to automate additional STIG rules. #446
- Updated logfile in 2012R2 MS STIG leveraging HardCodedRule to automate additional STIG rules. #448
- Declarative definition of a rule in the StigData log file to provide a standard way to populate unautomated rules #435
- Updated PowerSTIG to leverage AuditSetting instead of the Script resource. Additionally renamed WmiRule to AuditSettingRule #431
- Fixed #419: PowerStig is creating resource xSSLSettings with the wrong value for Name.
- Added support for Windows Defender, Version 1, Release 5 #393
- Added support for Internet Explorer 11 Version 1, Release 17 #422
- Added support for Server 2016 STIG, Version 1, Release 8 #418
- Update PowerSTIG to enforce additional rules in the SQL Server 2012 STIG #438
- Added support for Windows Defender Antivirus STIG, Version 1, Release 6 #462
- Added support for Firefox STIG v4r26 #458
- Updated logfile in DotNet Framework STIG leveraging HardCodedRule to automate additional STIG rules. #454
- Fixed #493: IIS 8/5 Server STIG rule V-76745 is referencing the incorrect IIS default path
- Fixed #505: Missing reg key setting on V-76759 IIS Server 8.5 v1R7