Item Search

NameAudit NamePluginCategory
1.1.3.4.5 Configure 'Devices: Prevent users from installing printer drivers'CIS Windows 8 L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

1.19 Ensure 'Improve harmful app detection' is set to 'Enabled'AirWatch - CIS Google Android v1.3.0 L1MDM
1.19 Ensure 'Improve harmful app detection' is set to 'Enabled'MobileIron - CIS Google Android v1.3.0 L1MDM
1.21 Ensure 'Improve harmful app detection' is set to EnabledMobileIron - CIS Google Android 7 v1.0.0 L1MDM
4.6.2 Ensure BFD Authentication is Not Set to Loose-CheckCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - basic-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - From-addressDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - logging severityDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - Recipient-addressDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - scanning-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - smtpDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v20H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 1903 DC v1.19.9Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 1909 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT MSCT Windows Server 2022 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2022 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v20H2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

DTBI715 - Crash Detection must be enforced.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

CONFIGURATION MANAGEMENT

DTBI715-IE11 - Crash Detection management must be enforced.DISA STIG IE 11 v2r5Windows

CONFIGURATION MANAGEMENT

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-003010 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-EG-003016 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-MB-003030 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-MB-003031 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-003010 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-003010 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-MB-002880 - The applications built-in Malware Agent must be disabled.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

Fortigate - AV GraywareTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND INFORMATION INTEGRITY

JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.DISA Juniper SRX Services Gateway VPN v3r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Detection Prevention - IP TTL DecrementTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000540 - Symantec ProxySG must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000600 - Symantec ProxySG providing content filtering must be configured to integrate with a system-wide intrusion detection system.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000001 - Microsoft Defender AV must be configured to block the Potentially Unwanted Application (PUA) feature - PUA feature.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY