Item Search

NameAudit NamePluginCategory
1.6.1 Ensure 'SSH source restriction' is set to an authorized IP addressCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.6.2 Ensure 'SSH version 2' is enabledCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'MobileIron - CIS Apple iOS 17 Institution Owned L1MDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'AirWatch - CIS Apple iOS 17 Institution Owned L1MDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.2.1.30 Ensure 'Allow password sharing (supervised only)' is set to 'Disabled'AirWatch - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL, AWARENESS AND TRAINING, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.5.3.2.3 Ensure iptables rules exist for all open ports - PPSM CLSA and vulnerability assessments.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

5.1.1 Enable Compromised Host QuarantineCIS Fortigate 7.0.x v1.3.0 L1FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CASA-FW-000030 - The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules - VPN Group PolicyDISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

CASA-FW-000030 - The Cisco ASA must be configured to restrict VPN traffic according to organization-defined filtering rules - VPN RulesDISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

ESXI-06-000004 - Remote logging for ESXi hosts must be configured.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

ACCESS CONTROL

GEN001000 - Remote consoles must be disabled or protected from unauthorized access.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN001000 - Remote consoles must be disabled or protected from unauthorized access.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

KNOX-07-005100 - The Samsung must be configured to enable authentication of hotspot connections to the device using a preshared key.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

ACCESS CONTROL

KNOX-07-005100 - The Samsung must be configured to enable authentication of hotspot connections to the device using a preshared key.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

ACCESS CONTROL

OL08-00-010070 - All OL 8 remote access methods must be monitored.DISA Oracle Linux 8 STIG v2r1Unix

ACCESS CONTROL

PHTN-30-000006 - The Photon operating system must have the sshd SyslogFacility set to 'authpriv'.DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

ACCESS CONTROL

PHTN-30-000008 - The Photon operating system must have the sshd LogLevel set to 'INFO'.DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

ACCESS CONTROL

PHTN-40-000012 The Photon operating system must monitor remote access logins.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

ACCESS CONTROL

PHTN-40-000200 The Photon operating system must configure the Secure Shell (SSH) SyslogFacility.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

ACCESS CONTROL

PHTN-67-000007 - The Photon operating system must have sshd authentication logging enabled.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL

PHTN-67-000008 - The Photon operating system must have the sshd LogLevel set to 'INFO' - INFO.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL

PHTN-67-000055 - The Photon operating system must configure sshd with a specific ListenAddress.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL

RHEL-08-040090 - A RHEL 8 firewall must employ a deny-all, allow-by-exception policy for allowing connections to other systems.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-08-040100 - A firewall must be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

ACCESS CONTROL

RHEL-09-652030 - All RHEL 9 remote access methods must be monitored.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

SLES-15-010150 - The SUSE operating system must log SSH connection attempts and failures to the server.DISA SLES 15 STIG v2r1Unix

ACCESS CONTROL

SYMP-AG-000020 - Symantec ProxySG providing intermediary services for remote access communications traffic must ensure outbound traffic is monitored for compliance with remote access security policies.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

UBTU-20-010403 - The Ubuntu operating system must monitor remote access methods.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-20-010433 - The Ubuntu operating system must have an application firewall installed in order to control remote access methods.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-20-010434 - The Ubuntu operating system must enable and run the uncomplicated firewall(ufw).DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-22-251015 - Ubuntu 22.04 LTS must enable and run the Uncomplicated Firewall (ufw).DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL

UBTU-22-652015 - Ubuntu 22.04 LTS must monitor remote access methods.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL

VCRP-67-000005 - The rhttpproxy must produce log records containing sufficient information to establish the source of events.DISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

ACCESS CONTROL

VCRP-67-000008 - The rhttproxy must exclusively use the HTTPS protocol for client connections - certificateDISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

ACCESS CONTROL

VCRP-67-000008 - The rhttproxy must exclusively use the HTTPS protocol for client connections - privateKeyDISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

ACCESS CONTROL

VCRP-67-000008 - The rhttproxy must exclusively use the HTTPS protocol for client connections - vecsServerNameDISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

ACCESS CONTROL

VCRP-70-000006 - Envoy must exclusively use the HTTPS protocol for client connections.DISA STIG VMware vSphere 7.0 RhttpProxy v1r1Unix

ACCESS CONTROL

WBSP-AS-000120 - The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes - depthDISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000120 - The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes - enabledDISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000120 - The WebSphere Application Server automatic repository checkpoints must be enabled to track configuration changes - enabledDISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000130 - The WebSphere Application Server administrative security must be enabled.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WBSP-AS-000130 - The WebSphere Application Server administrative security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WN11-UR-000090 - The 'Deny log on through Remote Desktop Services' user right on Windows 11 workstations must be configured to prevent access from highly privileged domain accounts and local accounts on domain systems and unauthenticated access on all systems.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL

WN22-AU-000190 - Windows Server 2022 must be configured to audit logon successes.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

WN22-MS-000120 - Windows Server 2022 Deny log on through Remote Desktop Services user right on domain-joined member servers must be configured to prevent access from highly privileged domain accounts and all local accounts and from unauthenticated access on all systems.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL

WNFWA-000100 - Inbound exceptions to the firewall on domain workstations must only allow authorized remote management hosts.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL