Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 29
• 1440 Total
Next
Next ››
Name
Audit Name
Plugin
Category
4.1.3.2 Ensure actions as another user are always logged
CIS Rocky Linux 8 Workstation L2 v1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged
CIS Oracle Linux 9 Workstation L2 v1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged
CIS Red Hat EL9 Server L2 v1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged
CIS AlmaLinux OS 9 Workstation L2 v1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - /etc/audit/rules.d/*.rules b32
CIS Oracle Linux 8 Workstation L2 v2.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - auditctl b32
CIS AlmaLinux OS 8 Server L2 v2.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - auditctl b32
CIS Red Hat EL8 Workstation L2 v2.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - auditctl b32
CIS Ubuntu Linux 22.04 LTS Workstation L2 v.1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - auditctl b64
CIS Oracle Linux 8 Workstation L2 v2.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - auditctl b64
CIS Oracle Linux 8 Server L2 v2.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - auditctl b64
CIS Ubuntu Linux 22.04 LTS Workstation L2 v.1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - rules.d b64
CIS Ubuntu Linux 22.04 LTS Workstation L2 v.1.0.0
Unix
4.1.3.2 Ensure actions as another user are always logged - rules.d b64
CIS AlmaLinux OS 8 Server L2 v2.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected
CIS Rocky Linux 9 Server L2 v1.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected
CIS AlmaLinux OS 9 Server L2 v1.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected
CIS Debian Linux 11 Workstation L2 v.1.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected
CIS Rocky Linux 8 Workstation L2 v1.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected
CIS Rocky Linux 9 Workstation L2 v1.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected - /etc/audit/rules.d/*.rules
CIS Oracle Linux 8 Server L2 v2.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected - auditctl
CIS Oracle Linux 8 Workstation L2 v2.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected - auditctl sudo log
CIS Ubuntu Linux 22.04 LTS Server L2 v.1.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected - auditctl sudo log
CIS AlmaLinux OS 8 Workstation L2 v2.0.0
Unix
4.1.3.3 Ensure events that modify the sudo log file are collected - auditctl sudo log
CIS AlmaLinux OS 8 Server L2 v2.0.0
Unix
4.1.4 Ensure login and logout events are collected - auditctl faillog
CIS Fedora 28 Family Linux Workstation L2 v1.0.0
Unix
4.1.4 Ensure login and logout events are collected - faillog
CIS Fedora 28 Family Linux Workstation L2 v1.0.0
Unix
4.1.5 Ensure session initiation information is collected - btmp
CIS Fedora 28 Family Linux Server L2 v1.0.0
Unix
4.1.5 Ensure session initiation information is collected - btmp
CIS Fedora 28 Family Linux Workstation L2 v1.0.0
Unix
4.1.5 Ensure session initiation information is collected - utmp
CIS Fedora 28 Family Linux Server L2 v1.0.0
Unix
4.1.5 Ensure session initiation information is collected - wtmp
CIS Fedora 28 Family Linux Workstation L2 v1.0.0
Unix
4.1.15 Ensure system administrator actions (sudolog) are collected - /var/log/sudo.log
CIS Debian 10 Server L2 v1.0.0
Unix
4.1.15 Ensure system administrator actions (sudolog) are collected - /var/log/sudo.log
CIS Debian 10 Workstation L2 v1.0.0
Unix
4.1.15 Ensure system administrator actions (sudolog) are collected - auditctl /var/log/sudo.log
CIS Debian 10 Workstation L2 v1.0.0
Unix
4.1.15 Ensure system administrator actions (sudolog) are collected - auditctl /var/log/sudo.log
CIS Debian 10 Server L2 v1.0.0
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected
CIS CentOS 7 v3.1.1 Workstation L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected
CIS CentOS 7 v3.1.1 Server L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected
CIS CentOS 7 v3.1.2 Server L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - (64 bit)
CIS CentOS 7 v3.1.2 Workstation L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - (64 bit)
CIS CentOS 7 v3.1.2 Server L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl
CIS CentOS 7 v3.1.1 Server L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl
CIS Oracle Linux 7 Server L2 v3.1.1
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl
CIS CentOS 7 v3.1.1 Workstation L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl (64 bit)
CIS Red Hat EL7 Server L2 v3.1.1
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl (64 bit)
CIS CentOS 7 v3.1.2 Server L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl 64-bit
CIS Amazon Linux 2 v2.0.0 L2
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - auditctl b64 actions
CIS SUSE Linux Enterprise Server 12 L2 v3.0.0
Unix
4.1.15 Ensure system administrator command executions (sudo) are collected - rules.d 64-bit
CIS Amazon Linux 2 v2.0.0 L2
Unix
4.1.16 Ensure system administrator actions (sudolog) are collected
CIS Fedora 28 Family Linux Server L2 v1.0.0
Unix
4.1.16 Ensure system administrator actions (sudolog) are collected - actions
CIS Oracle Linux 8 Workstation L2 v1.0.1
Unix
4.1.16 Ensure system administrator actions (sudolog) are collected - auditctl sudo log
CIS AlmaLinux OS 8 Server L2 v1.0.0
Unix
5.4 Ensure 'SQL Server Audit' is set to capture both 'failed' and 'successful logins' - SUCCESSFUL_DATABASE_AUTHENTICATION_GROUP
CIS SQL Server 2022 Database L1 AWS RDS v1.0.0
MS_SQLDB
‹‹ Previous
Previous
Page 2 of 29
• 1440 Total
Next
Next ››