Item Search

NameAudit NamePluginCategory
1.1.4 Ensure nosuid option set on /tmp partitionCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

1.1.7 Ensure nodev option set on /var/tmp partitionCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

ACCESS CONTROL

1.1.14 Ensure nodev option set on /run/shm partitionCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

1.1.17 Ensure nodev option set on removable media partitionsCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL

1.1.18 Ensure nosuid option set on removable media partitionsCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

ACCESS CONTROL

1.4.4 Ensure core dump storage is disabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

2.2 Ensure Access to Sensitive Site Features Is Restricted To Authenticated Principals Only - ApplicationsCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

2.3.10.2 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.4 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.12 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.13 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DCWindows

ACCESS CONTROL

2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Windows Server 2019 STIG v2.0.0 L1 DCWindows

ACCESS CONTROL

2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.6 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file contentCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - init core file contentCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_ENABLED is set to yesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_PATTERN is set to /var/cores/core_%n_%f_%u_%g_%t_%pCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_SETID_ENABLED is set to yesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_INIT_PATTERN is set to coreCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

4.1 Restrict core dumps to protected directory - Check if COREADM_GLOB_PATTERN is set to /var/core/core_%n_%f_%u_%g_%t_%pCIS Solaris 9 v1.3Unix

ACCESS CONTROL

4.13 listener.ora - 'admin_restrictions_listener_name = on'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

ACCESS CONTROL

5.4.2.1 Ensure root is the only UID 0 accountCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL

5.4.2.1 Ensure root is the only UID 0 accountCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.5 Ensure root login is restricted to system consoleCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.1.11 Audit SUID executablesCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.1.12 Audit SGID executablesCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.1.12 Audit SGID executablesCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2 Add 'nosuid' option to /etc/rmmount.conf, Check if nosuid option is set.CIS Solaris 9 v1.3Unix

ACCESS CONTROL

6.6 Find Unauthorized SUID/SGID System ExecutablesCIS Solaris 9 v1.3Unix

ACCESS CONTROL

6.9 Restrict FTP UseCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

6.9 Restrict FTP UseCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

6.9 Restrict FTP Use - /etc/ftpd/ftpusersCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allowCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

6.14 Restrict root Login to System Console - CONSOLE = /dev/consoleCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

7.4 Create /etc/ftpd/ftpusersCIS Solaris 9 v1.3Unix

ACCESS CONTROL

7.4 Create /etc/ftpusersCIS Solaris 9 v1.3Unix

ACCESS CONTROL

7.9 Restrict at/cron To Authorized Users, should pass if 'root' exists in /etc/at.allow.CIS Solaris 9 v1.3Unix

ACCESS CONTROL

8.2.7 Prevent unauthorized connection of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

9.1 Check for Remote ConsolesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.1 Check for Remote ConsolesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

10.1 SN.1 Restrict access to suspend featureCIS Solaris 11.2 L2 v1.1.0Unix

ACCESS CONTROL

18.9.27.7 (L1) Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

18.10.87.2 (L1) Ensure 'Turn on PowerShell Transcription' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 L1 MSWindows

ACCESS CONTROL

45.18 (L1) Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v3.0.1 L1Windows

ACCESS CONTROL

45.29 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Intune for Windows 11 v3.0.1 L1Windows

ACCESS CONTROL