1.4 Ensure the default value of individual salt per vm is configured | CIS VMware ESXi 6.7 v1.1.0 Level 1 | VMware | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure XD/NX support is enabled | CIS Ubuntu Linux 14.04 LTS Server L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure XD/NX support is enabled | CIS SUSE Linux Enterprise Workstation 11 L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure XD/NX support is enabled | CIS SUSE Linux Enterprise Server 12 L1 v2.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure XD/NX support is enabled | CIS Debian 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.5.2 Ensure XD/NX support is enabled | CIS Debian 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.2.4.7.5 Ensure 'Turn off file validation' is set to 'Disabled' | CIS Microsoft Office Enterprise v1.1.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
2.4.13.5 Use Secure Virtual Memory | CIS Apple OSX 10.5 Leopard L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.2 Enable Stack Protection - noexec_user_stack | CIS Solaris 11.2 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.2 Enable Stack Protection - set noexec_user_stack = 1 | CIS Solaris 11 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.3 Enable Stack Protection - Makes sure 'noexec_user_stack' is set to 1 in /etc/system. Note: Only applicable if NX bit is set. | CIS Solaris 10 v5.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.2 Enable stack protection - Check if 'noexec_user_stack' is set to 1 in /etc/system (Solaris 2.6 or later) | CIS Solaris 9 v1.3 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.201 - The operating system must implement virtual address space randomization. | Tenable Fedora Linux Best Practices v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
10.17 Enable memory leak listener (verify present) | CIS Apache Tomcat 8 L1 v1.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
18.7.2 (L1) Ensure 'Configure Redirection Guard' is set to 'Enabled: Redirection Guard Enabled' | CIS Microsoft Windows Server 2019 v3.0.1 L1 DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.2 (L1) Ensure 'Configure Redirection Guard' is set to 'Enabled: Redirection Guard Enabled' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Domain Controller | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles' | CIS Microsoft Windows Server 2019 v3.0.1 L1 MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Domain Controller | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Member Server | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.5.7 (L1) Ensure 'Turn On Virtualization Based Security: Kernel-mode Hardware-enforced Stack Protection' is set to 'Enabled: Enabled in enforcement mode' | CIS Microsoft Windows 11 Enterprise v3.0.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.1 (L1) Ensure 'Allow Custom SSPs and APs to be loaded into LSASS' is set to 'Disabled' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Member Server | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 v3.0.0 NG - Domain Controller | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 v3.0.0 NG - Member Server | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.8.1.1 (L1) Ensure 'Configure enhanced anti-spoofing' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v2.0.0 L1 DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.8.1.1 Ensure 'Configure enhanced anti-spoofing' is set to 'Enabled' | CIS Microsoft Windows Server 2022 STIG v1.0.0 L1 DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 (L1) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' | CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L2 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L2 + BL + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 11 Enterprise v3.0.0 L1 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
20.67 Ensure 'Unified Extensible Firmware Interface (UEFI) firmware must be configured and run in UEFI mode, not Legacy BIOS' | CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
20.67 Ensure 'Unified Extensible Firmware Interface (UEFI) firmware must be configured and run in UEFI mode, not Legacy BIOS' | CIS Microsoft Windows Server 2016 STIG v2.0.0 STIG DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
Allow binary and script behaviors | MSCT Windows 10 v1709 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestBody' | TNS IBM HTTP Server Best Practice Middleware | Unix | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestFields' | TNS IBM HTTP Server Best Practice Middleware | Unix | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestFields' | TNS IBM HTTP Server Best Practice | Unix | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestline' | TNS IBM HTTP Server Best Practice | Unix | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Share Memory Control (QSHRMEMCTL) - '1' | IBM iSeries Security Reference v5r4 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Share Memory Control (QSHRMEMCTL) - '1' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Share Memory Control (QSHRMEMCTL) - '1' | IBM System i Security Reference for V7R2 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
Launching applications and files in an IFRAME - Internet Zone | MSCT Windows Server 1903 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Launching applications and files in an IFRAME - Restricted Sites Zone | MSCT Windows 10 v1511 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Launching applications and files in an IFRAME - Restricted Sites Zone | MSCT Windows Server 1903 MS v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Local intranet Zone - Disable 'Binary and script behaviors' | MS Security Advisory 2963983 Mitigation Settings audit | Windows | SYSTEM AND INFORMATION INTEGRITY |
VM : TransparentPageSharing-inter-VM-Enabled | VMWare vSphere 6.5 Hardening Guide | VMware | SYSTEM AND INFORMATION INTEGRITY |
VM: verify-vmsafe-cpumem-agentport | TNS VMWare vSphere Best Practices | VMware | SYSTEM AND INFORMATION INTEGRITY |