Item Search

NameAudit NamePluginCategory
2.2.19 Ensure 'Create symbolic links' is set to 'Administrators, NT VIRTUAL MACHINE\Virtual Machines'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

ACCESS CONTROL

2.3.10.7 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 Stand-alone v3.0.0 L1 NGWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 11 Enterprise v3.0.0 L1Windows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 Enterprise v3.0.0 L1Windows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL + NGWindows

ACCESS CONTROL

2.3.10.7 Ensure 'Network access: Remotely accessible registry paths'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BLWindows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BLWindows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows 10 Stand-alone v3.0.0 L1 NGWindows

ACCESS CONTROL

2.3.10.9 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.10.9 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows Server 2022 v3.0.0 L1 Member ServerWindows

ACCESS CONTROL

2.3.10.9 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.10 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DCWindows

ACCESS CONTROL

2.3.10.10 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2022 STIG v1.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.10 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.10 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2022 STIG v1.0.0 L1 DCWindows

ACCESS CONTROL

2.3.10.11 (L1) Configure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.11 Configure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

DISA_F5_BIG-IP_11_v2r3.audit from DISA F5 BIG-IP Local Traffic Manager v2r3 STIGDISA F5 BIG-IP Local Traffic Manager STIG v2r3F5
DISA_F5_BIG-IP_AFM_v2r1.audit from DISA F5 BIG-IP Advanced Firewall Manager v2r1 STIGDISA F5 BIG-IP Advanced Firewall Manager STIG v2r1F5
DISA_F5_BIG-IP_ASM_v2r1.audit from DISA F5 BIG-IP Application Security Manager v2r1 STIGDISA F5 BIG-IP Application Security Manager STIG v2r1F5
DISA_STIG_Docker_Enterprise_2.x_Linux_Unix_DTR_v2r2.audit from DISA Docker Enterprise 2.x Linux/UNIX v2r2 STIGDISA STIG Docker Enterprise 2.x Linux/Unix DTR v2r2Unix
DISA_STIG_Docker_Enterprise_2.x_Linux_Unix_UCP_v2r2.audit from DISA Docker Enterprise 2.x Linux/UNIX v2r2 STIGDISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix
DISA_STIG_Docker_Enterprise_2.x_Linux_Unix_v2r2.audit from DISA Docker Enterprise 2.x Linux/UNIX v2r2 STIGDISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix
DISA_STIG_Microsoft_Excel_2010_v1r11.audit for Microsoft Excel 2010, from DISA STIG Microsoft Excel 2010 v1r11DISA STIG Office 2010 Excel v1r11Windows
DISA_STIG_Microsoft_OneNote_2013_v1r2.audit for Microsoft OneNote 2013, from DISA STIG Microsoft OneNote 2013 v1r3DISA STIG Microsoft OneNote 2013 v1r3Windows
DISA_STIG_Microsoft_OneNote_2013_v1r3.audit for Microsoft OneNote 2013, from DISA STIG Microsoft OneNote 2013 v1r2DISA STIG Microsoft OneNote 2013 v1r3Windows
DISA_STIG_Microsoft_OneNote_2016_v1r2.audit for Microsoft OneNote 2016, from DISA STIG Microsoft OneNote 2016 v1r2DISA STIG Microsoft OneNote 2016 v1r2Windows
DISA_STIG_Microsoft_Outlook_2013_v1r13.audit for Microsoft Outlook 2013, from DISA STIG Microsoft Outlook 2013 v1r13DISA STIG Microsoft Outlook 2013 v1r13Windows
DISA_STIG_Microsoft_PowerPoint_2016_v1r1.audit for Microsoft PowerPoint 2016, from DISA STIG Microsoft PowerPoint 2016 v1r1DISA STIG Microsoft PowerPoint 2016 v1r1Windows
DISA_STIG_Microsoft_Project_2016_v1r1.audit for Microsoft Project 2016, from DISA STIG Microsoft Project 2016 v1r1DISA STIG Microsoft Project 2016 v1r1Windows
DISA_STIG_Microsoft_Word_2016_v1r1.audit for Microsoft Word 2016, from DISA STIG Microsoft Word 2016 v1r1DISA STIG Microsoft Word 2016 v1r1Windows
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_OS_v2r1.audit from DISA Splunk Enterprise 8.x for Linux v2r1 STIGDISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG OSUnix
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_REST_API_v2r1.audit from DISA Splunk Enterprise 8.x for Linux v2r1 STIGDISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk
DISA_STIG_VMware_vSphere_7.0_Photon_OS_v1r3.audit from DISA VMware vSphere 7.0 vCenter Appliance Photon OS v1r3 STIGDISA STIG VMware vSphere 7.0 Photon OS v1r3Unix
DISA_VMware_vSphere_8.0_vCenter_Appliance_Lookup_Service_STIG_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance Lookup Service STIG v2r1Unix
WN10-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows 10 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows 11 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-RG-000003-MS - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-MS-000020 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows Server 2016 STIG v2r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-MS-000020 - Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-CC-000020 - Windows Server 2022 must have WDigest Authentication disabled.DISA Windows Server 2022 STIG v2r2Windows

CONFIGURATION MANAGEMENT

WN22-MS-000020 - Windows Server 2022 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Windows Server 2022 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION