Item Search

NameAudit NamePluginCategory
1.1.19 Ensure nosuid is set on users' home directories.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.1.22 Ensure nosuid option set on removable media partitionsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.1.26 Ensure all world-writable directories are group-owned.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.2.8 Ensure the version of the operating system is an active vendor supported releaseCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.3.4 Ensure AIDE is configured to verify XATTRS - configCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.3.5 Ensure AIDE is configured to use FIPS 140-2 - sha512CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.5.7 Ensure kernel core dumps are disabled.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.8.16 Ensure automatic logon via GUI is not allowedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

1.8.17 Ensure unrestricted logon is not allowedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.8 Ensure FTP Server is not installed - FTP server package installed unless needed.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.22 Ensure TFTP daemon is configured to operate in secure mode - TFTP server is required, the TFTP daemon is configured to operate in secure mode.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.23 Ensure default SNMP community strings don't existCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

3.5.1.4 Ensure firewalld service enabled and running - statusCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

3.5.1.5 Ensure firewalld default zone is setCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

3.5.4 Ensure IP tunnels are not configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.2.6 Ensure the sudoers file restricts sudo access to authorized personnel - sudoersCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.2.6 Ensure the sudoers file restricts sudo access to authorized personnel - sudoers.dCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.3.11 Ensure SSH HostbasedAuthentication is disabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.3.34 Ensure SSH compressions setting is delayedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.3.35 Ensure SSH X11UseLocalhost is enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.3.36 Ensure no '.shosts' files exist on the system - .shosts files exist on the systemCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.6 Ensure no accounts are configured with blank or null passwords - password-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.6 Ensure no accounts are configured with blank or null passwords - system-authCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.4.8 Ensure date and time of last successful logon - showfailedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.5.1.10 Ensure delay between logon prompts on failureCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

5.5.8 Ensure Default user umask is 077CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.1.16 Ensure all world-writable directories are owned by root, sys, bin, or an application User IdentifierCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.2.18 Ensure there are no unnecessary accountsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

6.2.26 Ensure local interactive users' dot files executable paths resolve to the users home directory.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

Big Sur - Enforce Dual Authorization for Movement and Deletion of Audit InformationNIST macOS Big Sur v1.4.0 - All ProfilesUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-171Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - All ProfilesUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enable Firewall LoggingNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Enforce Dual Authorization for Movement and Deletion of Audit InformationNIST macOS Catalina v1.5.0 - All ProfilesUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Disable Screen Sharing and Apple Remote DesktopNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Enforce Dual Authorization for Movement and Deletion of Audit InformationNIST macOS Monterey v1.0.0 - All ProfilesUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT