1.6.2 Ensure 'SSH version 2' is enabled | CIS Cisco ASA 9.x Firewall L1 v1.1.0 | Cisco | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
1.12.5 Solicited Remote Assistance | CIS Windows 2008 SSLF v1.2.0 | Windows | ACCESS CONTROL |
2.0 Install & Config - 'Enable SSH' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.1.1 Ensure 'SECURE_CONTROL_<listener_name>' Is Set In 'listener.ora' | CIS Oracle Server 11g R2 Unix v2.2.0 | Unix | ACCESS CONTROL |
2.1.9 Enable Global Strong Encryption | CIS Fortigate 7.0.x v1.3.0 L2 | FortiGate | ACCESS CONTROL |
2.2 SMTP - 'AccessSSL128 = True' | CIS IIS 6.0 v1.0.0 | Windows | ACCESS CONTROL |
2.2 SMTP - 'AuthNTLM = True' | CIS IIS 6.0 v1.0.0 | Windows | ACCESS CONTROL |
2.2.2 - Configuring SSH - disabling direct root access - 'PermitRootLogin = no' | CIS AIX 5.3/6.1 L1 v1.1.0 | Unix | ACCESS CONTROL |
2.2.35 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account, Enterprise Admins Group, and Domain Admins Group' (STIG MS only) | CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL |
2.5 WebDAV Authentication - 'Global Setting - AuthNTLM = True' | CIS IIS 6.0 v1.0.0 | Windows | ACCESS CONTROL |
4.10 MachineKey | CIS IIS 6.0 v1.0.0 | Windows | ACCESS CONTROL |
4.39 listener.ora - 'secure_control_listener_name = (TCP,IPC)' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL |
4.39 listener.ora - 'secure_control_listener_name = (TCP,IPC)' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
4.41 listener.ora - 'secure_register_listener_name = (TCP,IPC)' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
5.02 OAS - 'Encryption Type - sqlnet.encryption_server = REQUIRED' | CIS Oracle 9/10 OS Audit L2 v2.01 | Unix | ACCESS CONTROL |
5.2.8 Ensure SSH root login is disabled | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | ACCESS CONTROL |
5.2.10 Ensure SSH root login is disabled | CIS Red Hat EL8 Server L1 v1.0.0 | Unix | ACCESS CONTROL |
5.03 OAS - 'Encryption Type - sqlnet.encryption_client = (ACCEPTED|REQUESTED|REQUIRED)' | CIS Oracle 9 10 Windows Level2 v2.01 | Windows | ACCESS CONTROL |
5.05 OAS - 'Integrity Protection - sqlnet.crypto_checksum_client = REQUIRED' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
5.05 OAS - 'Integrity Protection - sqlnet.crypto_checksum_client = REQUIRED' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL |
5.08 OAS - 'Integrity Protection - sqlnet.crypto_checksum_server = REQUIRED' | CIS Oracle 9/10 OS Audit L2 v2.01 | Unix | ACCESS CONTROL |
5.08 OAS - 'Integrity Protection - sqlnet.crypto_checksum_server=REQUIRED sqlnet.crypto_checksum_client=REQUIRED' | CIS Oracle 9 10 Windows Level2 v2.01 | Windows | ACCESS CONTROL |
5.09 OAS - 'Integrity Protection - sqlnet.crypto_checksum_types_server = (SHA1)' | CIS Oracle 9 10 Windows Level2 v2.01 | Windows | ACCESS CONTROL |
6.6 Disable root login for SSH - PermitRootLogin = no | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.6 Disable root login for SSH - PermitRootLogin = no | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
9.3.8 Disable SSH Root Login | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
12.59 Remote Administration of Listener - 'Configure listener to have an SSL port.' | CIS Oracle 9 10 Windows Level2 v2.01 | Windows | ACCESS CONTROL |
18.9.97.2.2 Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Windows 7 Workstation Level 2 + Bitlocker v3.1.0 | Windows | ACCESS CONTROL |
18.9.97.2.2 Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Windows 7 Workstation Level 2 v3.1.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Client - AllowBasic | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Client - AllowBasic | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Client - AllowBasic | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Service - AllowUnencryptedTraffic | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Brocade : 'Set SNMP security level to authentication and privacy' | TNS Brocade FabricOS Best Practices | Brocade | ACCESS CONTROL |
Disallow Digest authentication | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Disallow Digest authentication | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
FireEye - SNMP v3 users have passwords | TNS FireEye | FireEye | ACCESS CONTROL |
FireEye - SNMP v3 uses AES instead of DES | TNS FireEye | FireEye | ACCESS CONTROL |
Fortigate - VPN SSL cipher suite > than 128 bits | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Fortigate - VPN SSL cipher suite > than 128 bits | TNS Fortigate FortiOS Best Practices | FortiGate | ACCESS CONTROL |
ScreenOS:User Account SSHv2 PKA Key | TNS Juniper ScreenOS Best Practices Audit | Juniper | ACCESS CONTROL |
Set client connection encryption level | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
WatchGuard : SNMP Configuration - v3 user has password - priv protocol | TNS Best Practice WatchGuard Audit 1.0.0 | WatchGuard | ACCESS CONTROL |