Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 3 of 6
• 284 Total
Next
Next ››
Name
Audit Name
Plugin
Category
1.3.2 Ensure filesystem integrity is regularly checked - aide
CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG
Unix
CONFIGURATION MANAGEMENT
GEN000140 - A file integrity baseline must be created and maintained.
DISA STIG Solaris 10 X86 v2r2
Unix
GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.
DISA STIG Solaris 10 SPARC v2r1
Unix
GEN002400 - The system must be checked weekly for unauthorized setuid files, as well as, unauthorized modification to authorized setuid files.
DISA STIG Solaris 10 X86 v2r1
Unix
GEN002460 - The system must be checked weekly for unauthorized setgid files, as well as, unauthorized modification to authorized setgid files.
DISA STIG Solaris 10 SPARC v2r1
Unix
GEN002460 - The system must be checked weekly for unauthorized setgid files, as well as, unauthorized modification to authorized setgid files.
DISA STIG Solaris 10 X86 v2r2
Unix
OL6-00-000302 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.
DISA STIG Oracle Linux 6 v2r6
Unix
OL6-00-000303 - The operating system must employ automated mechanisms, per organization defined frequency, to detect the addition of unauthorized components/devices into the operating system.
DISA STIG Oracle Linux 6 v2r6
Unix
OL6-00-000304 - The operating system must employ automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization defined frequency.
DISA STIG Oracle Linux 6 v2r6
Unix
OL6-00-000305 - The operating system must provide a near real-time alert when any of the organization defined list of compromise or potential compromise indicators occurs.
DISA STIG Oracle Linux 6 v2r6
Unix
OL6-00-000306 - The operating system must detect unauthorized changes to software and information.
DISA STIG Oracle Linux 6 v2r6
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aide
DISA Oracle Linux 7 STIG v2r13
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aide
DISA Oracle Linux 7 STIG v2r9
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aide
DISA Oracle Linux 7 STIG v2r11
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aide
DISA Oracle Linux 7 STIG v2r12
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Oracle Linux 7 STIG v2r12
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Oracle Linux 7 STIG v2r11
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Oracle Linux 7 STIG v2r13
Unix
OL07-00-020040 - The Oracle Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Oracle Linux 7 STIG v2r9
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - aide
DISA Oracle Linux 8 STIG v1r4
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - aide
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - grep aide /etc/crontab /var/spool/cron/root
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - grep aide /etc/crontab /var/spool/cron/root
DISA Oracle Linux 8 STIG v1r4
Unix
OL08-00-010360 - The OL 8 file integrity tool must notify the System Administrator (SA) when changes to the baseline configuration or anomalies in the operation of any security functions are discovered within an organizationally defined frequency - ls -la /etc/cron.* | grep aide
DISA Oracle Linux 8 STIG v1r4
Unix
RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly - aide
DISA Red Hat Enterprise Linux 7 STIG v3r9
Unix
RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly - cron
DISA Red Hat Enterprise Linux 7 STIG v3r12
Unix
RHEL-07-020030 - The Red Hat Enterprise Linux operating system must be configured so that a file integrity tool verifies the baseline operating system configuration at least weekly - cron
DISA Red Hat Enterprise Linux 7 STIG v3r9
Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - aide
DISA Red Hat Enterprise Linux 7 STIG v3r9
Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Red Hat Enterprise Linux 7 STIG v3r10
Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Red Hat Enterprise Linux 7 STIG v3r12
Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Red Hat Enterprise Linux 7 STIG v3r8
Unix
RHEL-07-020040 - The Red Hat Enterprise Linux operating system must be configured so that designated personnel are notified if baseline configurations are changed in an unauthorized manner - cron
DISA Red Hat Enterprise Linux 7 STIG v3r9
Unix
RHEL-09-651015 - RHEL 9 must routinely check the baseline configuration for unauthorized changes and notify the system administrator when anomalies in the operation of any security functions are discovered.
DISA Red Hat Enterprise Linux 9 STIG v1r1
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r10
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r12
Unix
SLES-15-010420 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly.
DISA SLES 15 STIG v1r11
Unix
SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.
DISA STIG Solaris 11 SPARC v2r7
Unix
SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.
DISA STIG Solaris 11 SPARC v2r8
Unix
VCSA-70-000150 - vCenter must provide an immediate real-time alert to the system administrator (SA) and information system security officer (ISSO), at a minimum, of all audit failure events requiring real-time alerts.
DISA STIG VMware vSphere 7.0 vCenter v1r2
VMware
WN16-00-000240 - System files must be monitored for unauthorized changes.
DISA Windows Server 2016 STIG v2r5
Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.
DISA Windows Server 2016 STIG v2r3
Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.
DISA Windows Server 2016 STIG v2r6
Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.
DISA Windows Server 2016 STIG v2r7
Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.
DISA Windows Server 2016 STIG v2r2
Windows
WN16-00-000240 - System files must be monitored for unauthorized changes.
DISA Windows Server 2016 STIG v2r4
Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.
DISA Windows Server 2019 STIG v2r8
Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.
DISA Windows Server 2019 STIG v2r3
Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.
DISA Windows Server 2019 STIG v2r5
Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.
DISA Windows Server 2019 STIG v2r7
Windows
WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.
DISA Windows Server 2019 STIG v2r2
Windows
‹‹ Previous
Previous
Page 3 of 6
• 284 Total
Next
Next ››