Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 6
• 284 Total
Next
Next ››
Name
Audit Name
Plugin
Category
1.3.1 Ensure AIDE is installed
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
Unix
CONFIGURATION MANAGEMENT
1.3.2 Ensure filesystem integrity is regularly checked - cron
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
Unix
CONFIGURATION MANAGEMENT
1.3.2 Ensure filesystem integrity is regularly checked - mail
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
Unix
CONFIGURATION MANAGEMENT
F5BI-DM-000211 - The BIG-IP appliance must be configured to implement automated security responses if baseline configurations are changed in an unauthorized manner.
DISA F5 BIG-IP Device Management 11.x STIG v1r7
F5
SYSTEM AND INFORMATION INTEGRITY
GEN000140 - A file integrity baseline must be created and maintained.
DISA STIG Solaris 10 SPARC v2r2
Unix
GEN000140 - A file integrity baseline must be created and maintained.
DISA STIG Solaris 10 SPARC v2r1
Unix
GEN002260 - The system must be checked for extraneous device files at least weekly.
DISA STIG Solaris 10 SPARC v2r1
Unix
GEN002260 - The system must be checked for extraneous device files at least weekly.
DISA STIG Solaris 10 SPARC v2r2
Unix
GEN002260 - The system must be checked for extraneous device files at least weekly.
DISA STIG Solaris 10 X86 v2r2
Unix
GEN002260 - The system must be checked for extraneous device files at least weekly.
DISA STIG Solaris 10 X86 v2r1
Unix
GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.
DISA STIG Solaris 10 SPARC v2r2
Unix
GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.
DISA STIG Solaris 10 X86 v2r2
Unix
GEN002460 - The system must be checked weekly for unauthorized setgid files, as well as, unauthorized modification to authorized setgid files.
DISA STIG Solaris 10 SPARC v2r2
Unix
OL07-00-020028 - The Oracle Linux operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
DISA Oracle Linux 7 STIG v2r14
Unix
CONFIGURATION MANAGEMENT
OL08-00-010358 - OL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
DISA Oracle Linux 8 STIG v1r10
Unix
CONFIGURATION MANAGEMENT
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency
DISA Oracle Linux 8 STIG v1r7
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - /usr/sbin/aide --check
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - /usr/sbin/aide --check
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - /usr/sbin/aide --check
DISA Oracle Linux 8 STIG v1r4
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - aide
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - grep aide /etc/crontab /var/spool/cron/root
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - ls -la /etc/cron.* | grep aide
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - ls -la /etc/cron.* | grep aide
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - SA when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency
DISA Oracle Linux 8 STIG v1r8
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
DISA Oracle Linux 8 STIG v1r9
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency. - /usr/sbin/aide --check
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency. - aide
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency. - grep aide /etc/crontab /var/spool/cron/root
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency. - ls -la /etc/cron.* | grep aide
DISA Oracle Linux 8 STIG v1r1
Unix
RHEL-07-020028 - The Red Hat Enterprise Linux operating system must be configured to allow sending email notifications of configuration changes and adverse events to designated personnel.
DISA Red Hat Enterprise Linux 7 STIG v3r14
Unix
CONFIGURATION MANAGEMENT
RHEL-08-010358 - RHEL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
DISA Red Hat Enterprise Linux 8 STIG v1r13
Unix
RHEL-08-010358 - RHEL 8 must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
DISA Red Hat Enterprise Linux 8 STIG v1r14
Unix
CONFIGURATION MANAGEMENT
RHEL-08-010360 - The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - /usr/sbin/aide --check
DISA Red Hat Enterprise Linux 8 STIG v1r3
Unix
RHEL-08-010360 - The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - aide
DISA Red Hat Enterprise Linux 8 STIG v1r7
Unix
RHEL-08-010360 - The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - grep aide /etc/crontab /var/spool/cron/root
DISA Red Hat Enterprise Linux 8 STIG v1r6
Unix
RHEL-08-010360 - The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - ls -la /etc/cron.* | grep aide
DISA Red Hat Enterprise Linux 8 STIG v1r3
Unix
RHEL-08-010360 - The RHEL 8 file integrity tool must notify the system administrator when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency.
DISA Red Hat Enterprise Linux 8 STIG v1r14
Unix
CONFIGURATION MANAGEMENT
RHEL-09-215095 - RHEL 9 must have the s-nail package installed.
DISA Red Hat Enterprise Linux 9 STIG v1r3
Unix
CONFIGURATION MANAGEMENT
RHEL-09-651010 - RHEL 9 must have the AIDE package installed.
DISA Red Hat Enterprise Linux 9 STIG v1r2
Unix
RHEL-09-651010 - RHEL 9 must have the AIDE package installed.
DISA Red Hat Enterprise Linux 9 STIG v1r1
Unix
RHEL-09-651015 - RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.
DISA Red Hat Enterprise Linux 9 STIG v1r2
Unix
SLES-12-010498 - The SUSE operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
DISA SLES 12 STIG v2r13
Unix
CONFIGURATION MANAGEMENT
SLES-15-010418 - The SUSE operating system must be configured to allow sending email notifications of unauthorized configuration changes to designated personnel.
DISA SLES 15 STIG v1r13
Unix
CONFIGURATION MANAGEMENT
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly - crontab
DISA SLES 15 STIG v1r6
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r9
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r10
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r12
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r6
Unix
UBTU-20-010437 - The Ubuntu operating system must notify designated personnel if baseline configurations are changed in an unauthorized manner. The file integrity tool must notify the system administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered.
DISA STIG Ubuntu 20.04 LTS v1r10
Unix
WN22-00-000220 - Windows Server 2022 system files must be monitored for unauthorized changes.
DISA Windows Server 2022 STIG v1r5
Windows
CONFIGURATION MANAGEMENT
‹‹ Previous
Previous
Page 2 of 6
• 284 Total
Next
Next ››