Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 15
• 703 Total
Next
Next ››
Name
Audit Name
Plugin
Category
AMLS-L3-000120 - Arista MLS must bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
DISA STIG Arista MLS DCS-7000 Series RTR V1R2
Arista
AMLS-L3-000130 - Arista MLS must establish boundaries for IPv6 Admin, Site, Organization scope, and IPv4 Local-Scope multicast traffic.
DISA STIG Arista MLS DCS-7000 Series RTR V1R2
Arista
AMLS-L3-000170 - Arista MLS must not redistribute static routes to alternate gateway service provider into an EGP or IGP to the NIPRNet.
DISA STIG Arista MLS DCS-7000 Series RTR V1R2
Arista
AMLS-L3-000190 - Arista MLS must enforce that the managed network domain and the management network domain are separate routing domains.
DISA STIG Arista MLS DCS-7000 Series RTR V1R2
Arista
ARST-RT-000110 - The Arista perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
ARST-RT-000130 - The Arista multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
ARST-RT-000140 - The Arista multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
ARST-RT-000150 - The Arista router must be configured to have all inactive interfaces disabled.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
ARST-RT-000160 - The Arista perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
ARST-RT-000190 - The out-of-band management (OOBM) Arista gateway router must be configured to have separate IGP instances for the managed network and management network.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
ARST-RT-000200 - The out-of-band management (OOBM) Arista gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.
DISA STIG Arista MLS EOS 4.2x Router v1r1
Arista
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ACL Applied
DISA STIG Cisco ASA FW v1r2
Cisco
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ACL Applied
DISA STIG Cisco ASA FW v1r3
Cisco
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ACL Applied
DISA STIG Cisco ASA FW v1r4
Cisco
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ingress ACL
DISA STIG Cisco ASA FW v1r3
Cisco
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ingress ACL
DISA STIG Cisco ASA FW v1r4
Cisco
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ingress ACL
DISA STIG Cisco ASA FW v1r2
Cisco
CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services. - ingress ACL
DISA STIG Cisco ASA FW v1r1
Cisco
CASA-FW-000020 - The Cisco ASA must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
DISA STIG Cisco ASA FW v1r1
Cisco
CASA-FW-000020 - The Cisco ASA must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
DISA STIG Cisco ASA FW v1r3
Cisco
CASA-FW-000020 - The Cisco ASA must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.
DISA STIG Cisco ASA FW v1r2
Cisco
CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies - ACL
DISA STIG Cisco ASA VPN v1r1
Cisco
CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies - ACL
DISA STIG Cisco ASA VPN v1r3
Cisco
CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies - crypto map
DISA STIG Cisco ASA VPN v1r1
Cisco
CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies - crypto map
DISA STIG Cisco ASA VPN v1r3
Cisco
CISC-RT-000250 - The Cisco perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
DISA STIG Cisco IOS Router RTR v1r4
Cisco
CISC-RT-000250 - The Cisco perimeter switch must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
DISA STIG Cisco NX-OS Switch RTR v1r1
Cisco
CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space - ISP access list
DISA STIG Cisco IOS Router RTR v1r4
Cisco
CISC-RT-000280 - The Cisco perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the sites address space - ISP interface
DISA STIG Cisco IOS Router RTR v1r4
Cisco
CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.
DISA STIG Cisco IOS Router RTR v1r4
Cisco
CISC-RT-000300 - The Cisco perimeter router must be configured to not redistribute static routes to an alternate gateway service provider into BGP or an IGP peering with the NIPRNet or to other autonomous systems.
DISA STIG Cisco IOS Router RTR v1r4
Cisco
CISC-RT-000800 - The Cisco multicast switch must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled - ip access-list
DISA STIG Cisco IOS Switch RTR v1r1
Cisco
CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic - interfaces
DISA STIG Cisco NX-OS Switch RTR v1r1
Cisco
CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic - ip access-list
DISA STIG Cisco NX-OS Switch RTR v1r1
Cisco
CISC-RT-000810 - The Cisco multicast edge switch must be configured to establish boundaries for administratively scoped multicast traffic - ip access-list
DISA STIG Cisco IOS Switch RTR v1r1
Cisco
EDGE-00-000001 - User control of proxy settings must be disabled.
DISA STIG Edge v1r1
Windows
EDGE-00-000001 - User control of proxy settings must be disabled.
DISA STIG Edge v1r5
Windows
EDGE-00-000001 - User control of proxy settings must be disabled.
DISA STIG Edge v1r6
Windows
JUEX-RT-000120 - The Juniper router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000130 - The Juniper router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000140 - The Juniper router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000150 - The Juniper multicast edge router must be configured to establish boundaries for administratively scoped multicast traffic.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000170 - The Juniper perimeter router must be configured to protect an enclave connected to an alternate gateway by using an inbound filter that only permits packets with destination addresses within the site's address space.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000180 - The Juniper perimeter router must not be configured to be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000200 - The Juniper out-of-band management (OOBM) gateway router must be configured to have separate IGP instances for the managed network and management network.
DISA Juniper EX Series Router v1r3
Juniper
JUEX-RT-000210 - The Juniper out-of-band management (OOBM) gateway router must not be configured to redistribute routes between the management network routing domain and the managed network routing domain.
DISA Juniper EX Series Router v1r3
Juniper
JUSX-IP-000003 - The Juniper Networks SRX Series Gateway IDPS must restrict or block harmful or suspicious communications traffic between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.
DISA Juniper SRX Services Gateway IDPS v1r2
Juniper
SHPT-00-000130 - The SharePoint application server upon which Central Administration is installed must not be installed in the DMZ.
DISA STIG SharePoint 2010 v1r8
Windows
SP13-00-000030 - SharePoint must enforce approved authorizations for controlling the flow of information between interconnected systems in accordance with applicable policy.
DISA STIG SharePoint 2013 v1r8
Windows
SP13-00-000155 - For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed, must not be installed in the DMZ.
DISA STIG SharePoint 2013 v1r8
Windows
‹‹ Previous
Previous
Page 1 of 15
• 703 Total
Next
Next ››