Item Search

NameAudit NamePluginCategory
1.1.3.10.7 Set 'Network access: Remotely accessible registry paths and sub-paths' to the following listCIS Windows 8 L1 v1.0.0Windows

ACCESS CONTROL

1.1.3.10.10 Set 'Network access: Remotely accessible registry paths' to the following listCIS Windows 8 L1 v1.0.0Windows

ACCESS CONTROL

1.04 Windows Oracle Account - 'Deny Log on Locally Right'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

ACCESS CONTROL

1.10 Windows Oracle Registry Key Permissions - 'Verify and set permissions'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.3.10.7 Ensure 'Network access: Remotely accessible registry paths'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

2.3.10.7 Ensure 'Network access: Remotely accessible registry paths'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

5.2.14 Ensure SSH access is limitedCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Act as part of the operating systemMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Act as part of the operating systemMSCT Windows Server 2019 MS v1.0.0Windows

ACCESS CONTROL

Act as part of the operating systemMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Create a pagefileMSCT Windows Server 2019 MS v1.0.0Windows

ACCESS CONTROL

Create global objectsMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Debug programsMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

DO0120-ORACLE11 - The Oracle software installation account should not be granted excessive host system privileges - 'Oracle service account is denied logon on locally right'DISA STIG Oracle 11 Installation v9r1 WindowsWindows

ACCESS CONTROL

Enable computer and user accounts to be trusted for delegationMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Ensure SSH access is limitedTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/pam.d/sshd pam_access.so required'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/ssh/sshd_config AllowGroups'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/ssh/sshd_config AllowUsers'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

Impersonate a client after authenticationMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Impersonate a client after authenticationMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Lock pages in memoryMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Manage auditing and security logMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Manage auditing and security logMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry pathsMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry pathsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry paths and subpathsMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry paths and subpathsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Perform volume maintenance tasksMSCT Windows Server 2019 MS v1.0.0Windows

ACCESS CONTROL

Perform volume maintenance tasksMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Perform volume maintenance tasksMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Take ownership of files or other objectsMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Take ownership of files or other objectsMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL