1.1.3.10.7 Set 'Network access: Remotely accessible registry paths and sub-paths' to the following list | CIS Windows 8 L1 v1.0.0 | Windows | ACCESS CONTROL |
2.3.10.7 Ensure 'Network access: Remotely accessible registry paths' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
4.18 init.ora - 'audit_sys_operations = TRUE' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
5.2.14 Ensure SSH access is limited | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL |
Access Credential Manager as a trusted caller | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Access this computer from the network | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Access this computer from the network | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Access this computer from the network | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Access this computer from the network | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow log on locally | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Allow log on locally | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Back up files and directories | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Backup files and directories | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Create a pagefile | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Create a token object | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Create a token object | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Create global objects | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Create permanent shared objects | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Debug programs | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Deny access to this computer from the network | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Deny log on locally | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Deny log on through Remote Desktop Services | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Deny log on through Remote Desktop Services | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Enable computer and user accounts to be trusted for delegation | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Enable computer and user accounts to be trusted for delegation | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Ensure SSH access is limited | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Force shutdown from a remote system | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Force shutdown from a remote system | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Force shutdown from a remote system | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/pam.d/sshd pam_access.so required' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN005521 - The SSH daemon must restrict login ability to specific users and/or groups - '/etc/ssh/sshd_config AllowUsers' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
Generate security audits | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Impersonate a client after authentication | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Impersonate a client after authentication | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Impersonate a client after authentication | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Increase scheduling priority | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Load and unload device drivers | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Modify firmware environment values | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Remotely accessible registry paths and subpaths | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Perform volume maintenance tasks | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Profile single process | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Profile single process | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Restore files and directories | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Take ownership of files or other objects | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Take ownership of files or other objects | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Take ownership of files or other objects | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
User IDs which disclose the privileges associated with it, should not be created. | TNS IBM HTTP Server Best Practice | Windows | ACCESS CONTROL |