Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 8
• 389 Total
Next
Next ››
Name
Audit Name
Plugin
Category
ARST-ND-000690 - The Arista network devices must use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.
DISA STIG Arista MLS EOS 4.2x NDM v1r1
Arista
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabled
DISA STIG Cisco ASA NDM v1r6
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabled
DISA STIG Cisco ASA NDM v1r1
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabled
DISA STIG Cisco ASA NDM v1r5
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - fips enabled
DISA STIG Cisco ASA NDM v1r3
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipher
DISA STIG Cisco ASA NDM v1r6
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipher
DISA STIG Cisco ASA NDM v1r1
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipher
DISA STIG Cisco ASA NDM v1r3
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh cipher
DISA STIG Cisco ASA NDM v1r5
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchange
DISA STIG Cisco ASA NDM v1r3
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchange
DISA STIG Cisco ASA NDM v1r5
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchange
DISA STIG Cisco ASA NDM v1r6
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh key-exchange
DISA STIG Cisco ASA NDM v1r1
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh version
DISA STIG Cisco ASA NDM v1r1
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh version
DISA STIG Cisco ASA NDM v1r6
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh version
DISA STIG Cisco ASA NDM v1r5
Cisco
CASA-ND-000470 - The Cisco ASA must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ssh version
DISA STIG Cisco ASA NDM v1r3
Cisco
CISC-ND-000530 - The Cisco switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts - ip ssh version 2
DISA STIG Cisco IOS XE Switch NDM v1r1
Cisco
ESXI-06-200037 - Implement replay-resistant authentication mechanisms by using Active Directory for local user authentication.
DISA STIG VMware vSphere 6.x ESXi v1r4
VMware
ESXI-06-200038 - Implement replay-resistant authentication mechanisms by using the vSphere Authentication Proxy.
DISA STIG VMware vSphere 6.x ESXi v1r4
VMware
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-https-ssl-versions tlsv1-2 tlsv1-3
DISA Fortigate Firewall NDM STIG v1r1
FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-https-ssl-versions tlsv1-2 tlsv1-3
DISA Fortigate Firewall NDM STIG v1r3
FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-ssh-v1 disable
DISA Fortigate Firewall NDM STIG v1r1
FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - admin-ssh-v1 disable
DISA Fortigate Firewall NDM STIG v1r3
FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - ssl-min-proto-version TLSv1-2
DISA Fortigate Firewall NDM STIG v1r1
FortiGate
FGFW-ND-000205 - The FortiGate device must implement replay-resistant authentication mechanisms for network access to privileged accounts. - ssl-min-proto-version TLSv1-2
DISA Fortigate Firewall NDM STIG v1r3
FortiGate
JUEX-NM-000260 - The Juniper EX switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.
DISA Juniper EX Series Network Device Management v1r4
Juniper
JUEX-NM-000260 - The Juniper EX switch must be configured to implement replay-resistant authentication mechanisms for network access to privileged accounts.
DISA Juniper EX Series Network Device Management v1r5
Juniper
RHEL-08-040060 - RHEL 8 must enforce SSHv2 for network access to all accounts. - install
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
RHEL-08-040060 - RHEL 8 must enforce SSHv2 for network access to all accounts. - protocol
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
SHPT-00-000531 - SharePoint sites must not use NTLM.
DISA STIG SharePoint 2010 v1r8
Windows
SP13-00-000075 - SharePoint must use replay-resistant authentication mechanisms for network access to privileged accounts.
DISA STIG SharePoint 2013 v1r8
Windows
SPLK-CL-000330 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.
DISA STIG Splunk Enterprise 8.x for Linux v1r5 STIG REST API
Splunk
SPLK-CL-000330 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.
DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG REST API
Splunk
SPLK-CL-000330 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.
DISA STIG Splunk Enterprise 8.x for Linux v1r4 STIG REST API
Splunk
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.
DISA Windows Server 2022 STIG v1r5
Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.
DISA Windows Server 2022 STIG v1r3
Windows
WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.
DISA Windows Server 2022 STIG v1r1
Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
DISA Windows Server 2022 STIG v1r1
Windows
WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.
DISA Windows Server 2022 STIG v1r3
Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.
DISA Windows Server 2022 STIG v1r3
Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.
DISA Windows Server 2022 STIG v1r4
Windows
WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.
DISA Windows Server 2022 STIG v1r5
Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
DISA Windows Server 2022 STIG v1r5
Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
DISA Windows Server 2022 STIG v1r1
Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
DISA Windows Server 2022 STIG v1r3
Windows
WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.
DISA Windows Server 2022 STIG v1r4
Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.
DISA Windows Server 2022 STIG v1r3
Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.
DISA Windows Server 2022 STIG v1r4
Windows
WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.
DISA Windows Server 2022 STIG v1r5
Windows
‹‹ Previous
Previous
Page 1 of 8
• 389 Total
Next
Next ››