Item Search

NameAudit NamePluginCategory
1.1.3.17.3 Set 'User Account Control: Behavior of the elevation prompt for standard users' to 'Automatically deny elevation requests'CIS Windows 8 L1 v1.0.0Windows

ACCESS CONTROL

1.1.3.17.5 Set 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' to 'Enabled'CIS Windows 8 L1 v1.0.0Windows

ACCESS CONTROL

1.4.2 Ensure bootloader password is set - 'set superusers'CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.1 Run BIND as a non-root User - process -u namedCIS BIND DNS v3.0.1 Authoritative Name ServerUnix

ACCESS CONTROL

2.1 Run BIND as a non-root User - UIDCIS BIND DNS v3.0.1 Caching Only Name ServerUnix

ACCESS CONTROL

2.3.4.2 Ensure 'Devices: Prevent users from installing printer drivers' is set to 'Enabled'CIS Windows 7 Workstation Level 2 v3.2.0Windows

ACCESS CONTROL

2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

2.3.17.7 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

3.3.1 Establish DAS administrative groupCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

ACCESS CONTROL

4.2.2.3 Ensure syslog-ng default file permissions configuredCIS Amazon Linux v2.1.0 L1Unix

AUDIT AND ACCOUNTABILITY

5.5 Ensure root login is restricted to system consoleCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

6.1.13 Audit SUID executablesCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

6.1.14 Audit SGID executablesCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

6.2.6 Ensure root PATH IntegrityCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

7.4 Secure SYSMON AuthorityCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

10.3 Set Default Group for root AccountCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

13.5 Verify No UID 0 Accounts Exist Other Than rootCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

18.9.85.1 Ensure 'Allow user control over installs' is set to 'Disabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows 10 1803 v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server 2016 MS v1.0.0Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows Server v2004 DC v1.0.0Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows 10 1803 v1.0.0Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows Server 2019 MS v1.0.0Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Configure Solicited Remote Assistance - fAllowToGetHelpMSCT Windows 10 v20H2 v1.0.0Windows

ACCESS CONTROL

Ensure root is the only UID 0 accountTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure root PATH IntegrityTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure rsyslog default file permissions configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

OpenStack Identity - Disable admin token in /etc/keystone/keystone-paste.iniTNS OpenStack Keystone/Identity Security GuideUnix

ACCESS CONTROL

User Account Control: Admin Approval Mode for the Built-in Administrator accountMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

User Account Control: Admin Approval Mode for the Built-in Administrator accountMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

User Account Control: Admin Approval Mode for the Built-in Administrator accountMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Admin Approval Mode for the Built-in Administrator accountMSCT Windows Server 2016 MS v1.0.0Windows

ACCESS CONTROL

User Account Control: Admin Approval Mode for the Built-in Administrator accountMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval ModeMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for administrators in Admin Approval ModeMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for standard usersMSCT Windows Server v2004 MS v1.0.0Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for standard usersMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for standard usersMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for standard usersMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Detect application installations and prompt for elevationMSCT Windows 10 v1507 v1.0.0Windows

ACCESS CONTROL

User Account Control: Detect application installations and prompt for elevationMSCT Windows Server v2004 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Detect application installations and prompt for elevationMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

User Account Control: Only elevate UIAccess applications that are installed in secure locationsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

User Account Control: Run all administrators in Admin Approval ModeMSCT Windows Server v1909 MS v1.0.0Windows

ACCESS CONTROL

User Account Control: Run all administrators in Admin Approval ModeMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Run all administrators in Admin Approval ModeMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL