2.3.10.2 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL | Windows | ACCESS CONTROL |
2.3.10.3 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NG | Windows | ACCESS CONTROL |
2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 NG | Windows | ACCESS CONTROL |
2.3.10.12 Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC | Windows | ACCESS CONTROL |
2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL + NG | Windows | ACCESS CONTROL |
2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain Controller | Windows | ACCESS CONTROL |
2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC | Windows | ACCESS CONTROL |
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | ACCESS CONTROL |
2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL | Windows | ACCESS CONTROL |
2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
18.6.11.4 (L1) Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | ACCESS CONTROL |
18.9.28.2 (L1) Ensure 'Do not display network selection UI' is set to 'Enabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 MS | Windows | ACCESS CONTROL |
18.9.28.3 Ensure 'Do not enumerate connected users on domain-joined computers' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
18.9.28.4 (L1) Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL | Windows | ACCESS CONTROL |
18.9.28.4 Ensure 'Enumerate local users on domain-joined computers' is set to 'Disabled' (MS only) | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL |
18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | ACCESS CONTROL |
18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NG | Windows | ACCESS CONTROL |
18.10.80.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | ACCESS CONTROL |
18.10.80.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL | Windows | ACCESS CONTROL |
19.7.41.1 Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - EnableSmartScreen | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - EnableSmartScreen | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows Server 1903 DC v1.19.9 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Disallow WinRM from storing RunAs credentials | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Do not show AutoRepublish warning alert | MSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0 | Windows | ACCESS CONTROL |
Do not show AutoRepublish warning alert | MSCT M365 Apps for enterprise 2312 v1.0.0 | Windows | ACCESS CONTROL |
Do not show AutoRepublish warning alert | MSCT Office 365 ProPlus 1908 v1.0.0 | Windows | ACCESS CONTROL |
Ensure nodev option set on /tmp partition | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Enumerate administrator accounts on elevation | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Enumerate local users on domain-joined computers | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 10 1903 v1.19.9 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 10 1909 v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 10 v21H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Network security: Allow LocalSystem NULL session fallback | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Network security: Allow LocalSystem NULL session fallback | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Recovery console: Allow automatic administrative logon | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Turn off toast notifications on the lock screen | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockLogging | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockLogging | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
VM : prevent-device-interaction-edit | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |