Item Search

NameAudit NamePluginCategory
1.6.3 Configure Netflow on Strategic PortsCIS Cisco NX-OS L2 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY, INCIDENT RESPONSE, SYSTEM AND INFORMATION INTEGRITY

1.69 (L1) Ensure 'Configure the list of types that are excluded from synchronization' is set to 'Enabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

2.2.3 - Configuring SSH - server protocol - 'Protocol 2'CIS AIX 5.3/6.1 L1 v1.1.0Unix
3.4 Restrict Zone-Transfers 'Zone Transfer Server 2'CIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.28.2 (L2) Ensure 'Turn off account-based insights, recent, favorite, and recommended files in File Explorer' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v3.0.0 L2 + BitLockerWindows

CONFIGURATION MANAGEMENT

18.10.28.2 (L2) Ensure 'Turn off account-based insights, recent, favorite, and recommended files in File Explorer' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v3.0.0 L2Windows

CONFIGURATION MANAGEMENT

18.10.28.2 (L2) Ensure 'Turn off account-based insights, recent, favorite, and recommended files in File Explorer' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L2 BLWindows

CONFIGURATION MANAGEMENT

check for correct radius server 1/2CIS Cisco IOS XR 7.x v1.0.0 L2Cisco
check for correct radius server 2/2CIS Cisco IOS XR 7.x v1.0.0 L2Cisco
check for correct TACACS+ server 1/2CIS Cisco IOS XR 7.x v1.0.0 L2Cisco
check for correct TACACS+ server 2/2CIS Cisco IOS XR 7.x v1.0.0 L2Cisco
check for ntp server 2CIS Cisco IOS XR 7.x v1.0.0 L1Cisco
check for server 2 in groupCIS Cisco IOS XR 7.x v1.0.0 L2Cisco
check ntp server #2 setCIS Fortigate 7.0.x v1.3.0 L1FortiGate
CISC-RT-000690 - The Cisco PE router must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000690 - The Cisco PE switch must be configured to enforce the split-horizon rule for all pseudowires within a Virtual Private LAN Services (VPLS) bridge domain.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

CONFIGURATION MANAGEMENT

DNS Profile - Address - DNS Server 2Tenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: Command Levels Not ChangedTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Device clock disable DST adjustmentTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Disable SNMP write accessTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Disable Telnet on IPV4TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Disable Telnet on IPV6TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Enable AAA authenticationTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Enable SNMP TrapsTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: Information Center is not disabled.TNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: Insecure HTTP is not configured.TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Require Group for SNMPv3 AccessTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Huawei: Review Device Info/VersionTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Set appropriate 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set appropriate 'shell' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set super passwordTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Simple Password Authentication is not used.TNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: SNMP appropriate trap hostTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SNMP Community string != privateTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: SNMP Community string != publicTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: SNMP is ConfiguredTNS Huawei VRP Best Practice AuditHuawei
Huawei: SSH Max Retries <= 3TNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: User Interfaces are AuthenticatedTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: User Interfaces Configured Inbound SSHTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: User Interfaces Idle Timeout Less Than 5 MinutesTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

JUEX-L2-000050 - The Juniper EX switch must be configured to permit authorized users to select a user session to capture.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

AUDIT AND ACCOUNTABILITY

ntp server 2DISA Fortigate Firewall NDM STIG v1r4FortiGate
ntp server 2DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista
Verify an external loghost is configuredTNS Huawei VRP Best Practice AuditHuawei
Verify SNMP trap agent is configured before checking hostTNS Huawei VRP Best Practice AuditHuawei
WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WBSP-AS-001290 - WebSphere Application Server must utilize FIPS 140-2-approved encryption modules when authenticating users and processes.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

WG340 W22 - A private web server must utilize an approved TLS version. - 'SSLEngine'DISA STIG Apache Site 2.2 Windows v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WG340 W22 - A private web server must utilize an approved TLS version. - 'SSLProtocol'DISA STIG Apache Site 2.2 Windows v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION