Item Search

NameAudit NamePluginCategory
1.7 Audit Computer NameCIS Apple macOS 10.14 v2.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 11.0 Big Sur v4.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 12.0 Monterey v3.1.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.1 Collect system configuration regularlyCIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.3 Ensure authentication is enabled in the sharded clusterCIS MongoDB 3.6 L2 Windows Audit v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded clusterCIS MongoDB 7 L2 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanismsCIS MongoDB 4 L1 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - CAFileCIS MongoDB 4 L1 OS Linux v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - CAFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - CAFileCIS MongoDB 6 L2 OS Windows v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 4 L1 OS Linux v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFileCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 14.0 Sonoma v1.1.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 13.0 Ventura v2.1.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.6.6 Enable Location ServicesCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsMobileIron - CIS Apple iPadOS 17 Institutionally Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsAirWatch - CIS Apple iOS 17 v1.1.0 End User Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsMobileIron - CIS Apple iOS 17 v1.1.0 End User Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsAirWatch - CIS Apple iOS 17 Institution Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsMobileIron - CIS Apple iOS 17 Institution Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsAirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsAirWatch - CIS Apple iPadOS 17 Institutionally Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

4.9 Ensure the latest iOS device architecture is used by high-value targetsMobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L2MDM

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

7.8 Extensible Firmware Interface (EFI) passwordCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BLWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 11 Enterprise v3.0.0 BLWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 10 Stand-alone v3.0.0 BLWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL + NGWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 10 Enterprise v3.0.0 L2 + BLWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (BL) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows 10 Enterprise v3.0.0 L2 + BL + NGWindows

CONFIGURATION MANAGEMENT

18.9.24.1 (L1) Ensure 'Enumeration policy for external devices incompatible with Kernel DMA Protection' is set to 'Enabled: Block All'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

CIS Control 1 (1.4) Maintain Detailed Asset InventoryCAS Implementation Group 1 Audit FileUnix

CONFIGURATION MANAGEMENT

CIS Control 1 (1.6) Ensure that unauthorized assets are removed, quarantined or the inventory is updatedCAS Implementation Group 1 Audit FileUnix

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 11 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 11 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server 1903 MS v1.19.9Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server 2022 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server v20H2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Rackspace Subnet DetailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of all Domains created since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Databases Deployed In RackspaceTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT