Item Search

NameAudit NamePluginCategory
2.1.1 Secure Installation via ISC SourceCIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat EL8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 11 v2.0.0 L2 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian Linux 12 v1.1.0 L2 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

18.4.5 (L1) Ensure 'LSA Protection' is set to 'Enabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 (L1) Ensure 'LSA Protection' is set to 'Enabled'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.7 (L1) Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.7 (L1) Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2019 v3.0.1 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.7 (L1) Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2019 v3.0.1 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.7 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.1 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2019 STIG v2.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.1 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2019 STIG v2.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2022 STIG v1.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2022 STIG v1.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure Secure Boot Level Set to FullNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Configures LSASS to run as a protected processMSCT Windows 11 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configures LSASS to run as a protected processMSCT Windows 11 v23H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Integrity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-acceptedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-certifiedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-supportedVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-supportedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure Secure Boot Level Set to FullNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY