Skip to main content
CUI

OCA Hostname Mapping

NIPR How it works: Each hostname can have multiple STIGs (e.g., a server might have Windows Server STIG, IIS STIG, and SQL Server STIG). Each hostname + STIG combination needs to be mapped to the appropriate OCA assessment area. For example, "WEBSERVER01" + "IIS STIG" maps to "Web Server" area, while "WEBSERVER01" + "Windows Server STIG" maps to "Windows OS" area.

59 hostname+STIG combinations  ·  All mapped ✓ 59 mapped · 0 need attention

Bulk Map by STIG Benchmark

Quickly map all hostnames using the same STIG benchmark.

Add/Edit Mapping

Map a hostname + STIG combination to an OCA assessment area

✓ Auto-mapped — 59 combinations
Hostname STIG Current Area Override Remove
MONT-AP-002 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-AP-002 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-AP-002 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-BE-002 MS SQL Server 2016 Database Security Technical Implementation Guide Database
MONT-BE-002 MS SQL Server 2016 Database Security Technical Implementation Guide Other Review
MONT-BE-002 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-BE-002 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-BE-002 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-DB-002 Database Security Requirements Guide Database
MONT-DB-002 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-DB-002 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-DB-002 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-DC-003 Active Directory Domain Security Technical Implementation Guide Domain Name System
MONT-DC-003 Active Directory Forest Security Technical Implementation Guide Domain Name System
MONT-DC-003 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-DC-003 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-DC-003 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-DC-003 Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide Domain Name System
MONT-DC-003 Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide Domain Name System
MONT-DP-001 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-DP-001 Microsoft IIS 10.0 Server Security Technical Implementation Guide Web Server
MONT-DP-001 Microsoft IIS 10.0 Server Security Technical Implementation Guide Web Server
MONT-DP-001 Microsoft IIS 10.0 Server Security Technical Implementation Guide Web Server
MONT-DP-001 Microsoft IIS 10.0 Site Security Technical Implementation Guide Web Server
MONT-DP-001 Microsoft IIS 10.0 Site Security Technical Implementation Guide Web Server
MONT-DP-001 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-DP-001 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-MB-002 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-MB-002 Microsoft Exchange 2016 Mailbox Server Security Technical Implementation Guide Exchange
MONT-MB-002 Microsoft IIS 10.0 Server Security Technical Implementation Guide Web Server
MONT-MB-002 Microsoft IIS 10.0 Server Security Technical Implementation Guide Web Server
MONT-MB-002 Microsoft IIS 10.0 Server Security Technical Implementation Guide Web Server
MONT-MB-002 Microsoft IIS 10.0 Site Security Technical Implementation Guide Web Server
MONT-MB-002 Microsoft IIS 10.0 Site Security Technical Implementation Guide Web Server
MONT-MB-002 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-MB-002 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-VSF-003 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-VSF-003 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-VSF-003 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-VSF-004 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-VSF-004 Microsoft Internet Explorer 11 Security Technical Implementation Guide Windows OS
MONT-VSF-004 Microsoft Windows Server 2016 Security Technical Implementation Guide Windows OS
MONT-WS-92010 Adobe Acrobat Professional DC Continuous Track Security Technical Implementation Guide Windows OS
MONT-WS-92010 Google Chrome Current Windows Security Technical Implementation Guide Windows OS
MONT-WS-92010 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-WS-92010 Microsoft Edge Security Technical Implementation Guide Windows OS
MONT-WS-92010 Microsoft Office 365 ProPlus Security Technical Implementation Guide Windows OS
MONT-WS-92010 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-WS-92010 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-WS-92010 Mozilla Firefox Security Technical Implementation Guide Windows OS
MONT-WS-92040 Adobe Acrobat Reader DC Continuous Track Security Technical Implementation Guide Windows OS
MONT-WS-92040 Google Chrome Current Windows Security Technical Implementation Guide Windows OS
MONT-WS-92040 Microsoft DotNet Framework 4.0 Security Technical Implementation Guide Windows OS
MONT-WS-92040 Microsoft Edge Security Technical Implementation Guide Windows OS
MONT-WS-92040 Microsoft Office 365 ProPlus Security Technical Implementation Guide Windows OS
MONT-WS-92040 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-WS-92040 Microsoft Windows 10 Security Technical Implementation Guide Windows OS
MONT-WS-92040 Mozilla Firefox Security Technical Implementation Guide Windows OS
MONTPOINTGTWYRTR Cisco IOS XE Router NDM Security Technical Implementation Guide Internal Network

OCA Assessment Areas Reference

Boundary Security
Firewalls, DMZ, perimeter security
Internal Network
Internal network switches, routers, VLANs
Combined Vulnerability Scan
ACAS/Nessus vulnerability scan results
Domain Name System
DNS servers and configuration
Host Based Security System
HBSS/Trellix endpoint security
Traditional Security
Physical security, access control
Wireless Communications/Mobility
WiFi, mobile devices
Cross Domain Solutions - Admin
CDS administrative controls
Cross Domain Solutions - Technical
CDS technical implementation
Exchange
Microsoft Exchange email servers
Web Server
IIS, Apache, web applications
Database
SQL Server, Oracle, database security
Video and Voice Over Internet Protocol (VVOIP)
VoIP phones, video conferencing
Windows OS
Windows workstations and servers
Unix OS
Linux, Unix, macOS systems
Releaseable Networks
Networks for coalition/external use
Virtual Environment
VMware, Hyper-V, containers
Other Review
Uncategorized or specialized systems
CUI