Item Search

NameAudit NamePluginCategory
1.1.5 Set 'login authentication for 'ip http'CIS Cisco IOS XE 17.x v2.1.0 L1Cisco

ACCESS CONTROL

2.1.1.1.3 Set 'modulus' to greater than or equal to 2048 for 'crypto key generate rsa'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

SYSTEM AND SERVICES ACQUISITION

2.2.2 Set 'ip address' for 'ntp server'CIS Cisco IOS XR 7.x v1.0.0 L1Cisco

AUDIT AND ACCOUNTABILITY

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

3.1.3.3 Log OSPF Adjacency ChangesCIS Cisco NX-OS L1 v1.1.0Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

5.003 - Booting into alternate operating systems is permitted.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

5.017 - The user is allowed to launch Windows Messenger (MSN Messenger, .NET Messenger).DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

18.10.57.2 Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Not configured' or 'Disabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.57.2 Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Not configured' or 'Disabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.58.2 Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Not configured' or 'Disabled' (STIG only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.58.2 Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Not configured' or 'Disabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.58.2 Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Not configured' or 'Disabled' (STIG only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.58.2 Ensure 'Turn on Basic feed authentication over HTTP' is set to 'Not configured' or 'Disabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

19.7.15.1.2 Ensure 'Turn on off details pane' is set to 'Enabled: Always hide'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.31 Ensure 'Host-based firewall is installed and enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

20.31 Ensure 'Host-based firewall is installed and enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

20.31 Ensure 'Host-based firewall is installed and enabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

20.31 Ensure 'Host-based firewall is installed and enabled'CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

AIOS-13-013100 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch.AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AMLS-NM-000160 - The Arista Multilayer Switch must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

ACCESS CONTROL

AMLS-NM-000370 - The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system - all loggingDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000400 - The Arista Multilayer Switch must, at a minimum, off-load audit records for interconnected systems in real time - logging hostDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000400 - The Arista Multilayer Switch must, at a minimum, off-load audit records for interconnected systems in real time - trap loggingDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

Brocade - Authentication policy must be rejectedTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Bottleneck alerts must be enabledTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Brocade - Brocade licenses must not be expiredTenable Best Practices Brocade FabricOSBrocade

CONFIGURATION MANAGEMENT

Brocade - SCP server host is approvedTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

CASA-ND-001250 - The Cisco ASA must be configured to generate audit records when concurrent logons from different workstations occur.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

Change the Rekeying TimerTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

CISC-RT-000260 - The Cisco perimeter router must be configured to only allow incoming communications from authorized sources to be routed to authorized destinations.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000290 - The Cisco perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

ACCESS CONTROL

CISC-RT-000393 - The Cisco perimeter router must be configured drop IPv6 packets with a Routing Header type 0, 1, or 3-255.DISA STIG Cisco IOS XE Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000397 - The Cisco perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.DISA STIG Cisco IOS Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000397 - The Cisco perimeter router must be configured to drop IPv6 packets containing the NSAP address option within Destination Option header.DISA STIG Cisco IOS-XR Router RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

Default Authentication RealmTenable Cisco ACICisco_ACI

ACCESS CONTROL

GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

IDENTIFICATION AND AUTHENTICATION

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=rootDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - type=roleDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

SonicWALL - GAV ON - LANTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - GAV ON - WANTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - GAV ON - WLANTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

System Alias and Banners - Controller CLI BannerTenable Cisco ACICisco_ACI

ACCESS CONTROL

vNetwork : reject-forged-transmit - 'PortGroup'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-mac-changes - 'portgroup'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-mac-changes - 'vswitch'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-mac-changes-StandardSwitchVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION