Item Search

NameAudit NamePluginCategory
2.1 Ensure 'global authorization rule' is set to restrict accessCIS IIS 8.0 v1.5.1 Level 1Windows

ACCESS CONTROL

2.2.14 Ensure 'SEC_PROTOCOL_ERROR_FURTHER_ACTION' Is Set to 'DELAY,3' or 'DROP,3'CIS Oracle Server 11g R2 DB v2.2.0OracleDB

ACCESS CONTROL

2.2.27 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.2.29 Ensure 'Deny log on locally' to include 'Guests, Enterprise Admins group, and Domain Admins group' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.2.30 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.6 Prevent unintended use of dvfilter network APIsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

2.7 Prevent unintended use of dvfilter network APIsCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

2.17.2 Ensure 'Never Allow Users to Specify Groups When Restricting Permission for Documents' is set to EnabledCIS Microsoft Office 2016 v1.1.0Windows

ACCESS CONTROL

2.17.5 Ensure 'Allow Users With Earlier Versions of Office to Read with Browsers....' is set to DisabledCIS Microsoft Office 2016 v1.1.0Windows

ACCESS CONTROL

3.1.10 Authenticate federated users at the instance levelCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

3.1.11 Authenticate federated users at the instance levelCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

3.1.11 Authenticate federated users at the instance levelCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

4.1.1.10 Ensure access on /var/adm/cron/at.allow is configuredCIS IBM AIX 7 v1.0.0 L1Unix

ACCESS CONTROL

4.2.7 Ensure 'Allow Window Management permission on these sites' Is ConfiguredCIS Google Chrome L2 v3.0.0Windows

ACCESS CONTROL

4.2.8 Ensure 'Block Window Management permission on these sites' Is ConfiguredCIS Google Chrome L2 v3.0.0Windows

ACCESS CONTROL

4.3 Ensure excessive administrative privileges are revokedCIS PostgreSQL 9.5 OS v1.1.0Unix

ACCESS CONTROL

4.3.11 Ensure 'allowPublicClients' is set to 'false' in OAuth 2.0CIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

4.4.3 Ensure 'logoutPageRedirectDomainNames' is set to relevant domain names for logout page redirectsCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL

6.1.3 Disable guest account loginCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

6.1.3 Disable guest account loginCIS Apple macOS 10.12 L1 v1.2.0Unix

ACCESS CONTROL

6.11 Set 'Never allow users to specify groups when restricting permission for documents' to 'Enabled'CIS MS Office Outlook 2010 v1.0.0Windows

ACCESS CONTROL

8.4.1 Control access to VMs through the dvfilter network APIsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

8.4.1 Control access to VMs through the dvfilter network APIsCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

20.37 Ensure 'Non-administrative accounts or groups only have print permissions on printer shares'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.37 Ensure 'Non-administrative accounts or groups only have print permissions on printer shares'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.37 Ensure 'Non-administrative accounts or groups only have print permissions on printer shares' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

Ensure 'HTTP source restriction' is set to an authorized IP addressTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'TACACS+/RADIUS' is configured correctly - protocolTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

IBM i : Authority for New Objects (QCRTAUT) - '*CHANGE'IBM System i Security Reference for V7R1 and V6R1AS/400

ACCESS CONTROL

IBM i : Authority for New Objects (QCRTAUT) - '*CHANGE'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 11 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 10 v1507 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows Server v2004 MS v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 10 v21H2 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows Server 1903 DC v1.19.9Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows Server v1909 DC v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 10 1909 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 10 v2004 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 11 v22H2 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

Network access: Allow anonymous SID/Name translationMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

User IDs which disclose the privileges associated with it, should not be created. 'lock'TNS IBM HTTP Server Best PracticeUnix

ACCESS CONTROL

User IDs which disclose the privileges associated with it, should not be created. 'lock'TNS IBM HTTP Server Best Practice MiddlewareUnix

ACCESS CONTROL

User IDs which disclose the privileges associated with it, should not be created. 'nologin'TNS IBM HTTP Server Best Practice MiddlewareUnix

ACCESS CONTROL

VM : verify-network-filterVMWare vSphere 6.0 Hardening GuideVMware

ACCESS CONTROL

VM : verify-network-filterVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL