1.1.3.10.7 Set 'Network access: Remotely accessible registry paths and sub-paths' to the following list | CIS Windows 8 L1 v1.0.0 | Windows | ACCESS CONTROL |
1.1.3.10.10 Set 'Network access: Remotely accessible registry paths' to the following list | CIS Windows 8 L1 v1.0.0 | Windows | ACCESS CONTROL |
1.04 Windows Oracle Account - 'Deny Log on Locally Right' | CIS v1.1.0 Oracle 11g OS Windows Level 1 | Windows | ACCESS CONTROL |
1.10 Windows Oracle Registry Key Permissions - 'Verify and set permissions' | CIS v1.1.0 Oracle 11g OS Windows Level 1 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.3.10.7 Ensure 'Network access: Remotely accessible registry paths' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.3.10.7 Ensure 'Network access: Remotely accessible registry paths' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
5.2.14 Ensure SSH access is limited | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL |
20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' | CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' | CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DC | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' (STIG only) | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MS | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
20.16 Ensure 'Default permissions for the HKEY_LOCAL_MACHINE registry hive must be maintained' (STIG only) | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DC | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
Act as part of the operating system | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Act as part of the operating system | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Act as part of the operating system | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Create a pagefile | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Create global objects | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Debug programs | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
DO0120-ORACLE11 - The Oracle software installation account should not be granted excessive host system privileges - 'Oracle service account is denied logon on locally right' | DISA STIG Oracle 11 Installation v9r1 Windows | Windows | ACCESS CONTROL |
Enable computer and user accounts to be trusted for delegation | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Ensure SSH access is limited | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/pam.d/sshd pam_access.so required' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/ssh/sshd_config AllowGroups' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/ssh/sshd_config AllowUsers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
Impersonate a client after authentication | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Impersonate a client after authentication | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Lock pages in memory | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths and subpaths | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths and subpaths | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Perform volume maintenance tasks | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Perform volume maintenance tasks | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Perform volume maintenance tasks | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Take ownership of files or other objects | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Take ownership of files or other objects | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |