Item Search

NameAudit NamePluginCategory
1.1 Secure Login and Telnet Disabling - Enable SSH serverTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.2 Password Security Policy - c) Configure 'strong-password dictionary' and 'same-consecutive' to avoid weak password - same-consecutiveTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-lengthTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-length - strong-password username-related-chk inverseTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.7.8 Ensure GDM autorun-never is enabledCIS Ubuntu Linux 22.04 LTS v3.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MEDIA PROTECTION

1.8 SSH Strong Algorithm - b) Disable encryption 3des-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - e) Disable encryption aes256-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - h) Disable hmac noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - a) VersionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - c) pki-profileTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.23 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE, RESTRICTED SERVICES\PrintSpoolerService'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.23 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE, RESTRICTED SERVICES\PrintSpoolerService'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.23 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE, RESTRICTED SERVICES\PrintSpoolerService'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.24 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

2.2.24 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.2.31 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE, RESTRICTED SERVICES\PrintSpoolerService' (DC only)CIS Microsoft Windows Server 2025 v2.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.31 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)CIS Microsoft Windows Server 2022 v5.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.32 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)CIS Microsoft Windows Server 2016 v4.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.32 (L1) Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' (DC only)CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.5 Product Default BannerTenable ZTE ROSNGZTE_ROSNG

ACCESS CONTROL

3.1 Authentication and Verification of OSPF Routing Protocols - authentication message-digestTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

3.1 Ensure detailed logging is enabledCIS NGINX v3.0.0 L1 ProxyUnix

AUDIT AND ACCOUNTABILITY

3.1 Ensure detailed logging is enabledCIS NGINX v3.0.0 L1 LoadbalancerUnix

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure access to /etc/security is configuredCIS IBM AIX 7 v1.1.0 L1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.1.1 Ensure that 'security defaults' is enabled in Microsoft Entra IDCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

7.2.2 Ensure syslog is configured to send logs to a remote log hostCIS IBM AIX 7 v1.1.0 L2Unix

AUDIT AND ACCOUNTABILITY

CIS Internet Explorer 10 Benchmark Version 1.1.0CIS IE 10 v1.1.0Windows
CIS_AlmaLinux_OS_8_v4.0.0_L1_Server.audit from CIS AlmaLinux OS 8 4.0.0CIS AlmaLinux OS 8 v4.0.0 L1 ServerUnix
CIS_AlmaLinux_OS_10_v1.0.0_L1_Server.audit from CIS AlmaLinux OS 10 1.0.0CIS AlmaLinux OS 10 v1.0.0 L1 ServerUnix
CIS_Apache_Tomcat_10_L1_v1.1.0_Middleware.audit from CIS Apache Tomcat 10 BenchmarkCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix
CIS_Debian_Linux_10_v2.0.0_L2_Server.audit from CIS Debian Linux 10 v2.0.0CIS Debian Linux 10 v2.0.0 L2 ServerUnix
CIS_Debian_Linux_11_v2.0.0_L2_Server.audit from CIS Debian Linux 11 v2.0.0CIS Debian Linux 11 v2.0.0 L2 ServerUnix
CIS_Debian_Linux_12_v1.1.0_L2_Workstation.audit from CIS Debian Linux 12 1.1.0CIS Debian Linux 12 v1.1.0 L2 WorkstationUnix
CIS_IBM_DB2_9_v3.0.1_Level_2_OS_Linux.audit from CIS DB2 9 LinuxCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix
CIS_IBM_DB2_10_v1.1.0_Level_1_OS_Linux.audit from CIS DB2 10.x LinuxCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix
CIS_Kubernetes_v1.12.0_L2_Worker_Node.audit from CIS Kubernetes Benchmark v1.12.0CIS Kubernetes v1.12.0 L2 Worker NodeUnix
CIS_Linux_Mint_22_v1.0.0_L1_Workstation.audit from CIS Linux Mint 22 1.0.0CIS Linux Mint 22 v1.0.0 L1 WorkstationUnix
CIS_Microsoft_Defender_Antivirus_v1.0.0_L1_Server.audit from CIS Microsoft Defender Antivirus 1.0.0CIS Microsoft Defender Antivirus v1.0.0 L1 ServerWindows
CIS_MongoDB_3.6_Benchmark_Level_1_DB_v1.1.0.audit from CIS MongoDB 3.6 BenchmarkCIS MongoDB 3.6 Database Audit L1 v1.1.0MongoDB
CIS_MongoDB_3.6_Benchmark_Level_2_DB_v1.1.0.audit from CIS MongoDB 3.6 BenchmarkCIS MongoDB 3.6 Database Audit L2 v1.1.0MongoDB
CIS_Oracle_Linux_9_v2.0.0_L1_Workstation.audit from CIS Oracle Linux 9 v2.0.0CIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix
CIS_Oracle_Linux_10_v1.0.0_L2_Workstation.audit from CIS Oracle Linux 10 1.0.0CIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix
CIS_PostgreSQL_11_v1.0.0_L1_OS_Linux.audit from CIS Benchmark for PostgreSQL 11CIS PostgreSQL 11 OS v1.0.0Unix
CIS_PostgreSQL_15_v1.2.0_L1_OS_Linux_PostgreSQLDB.audit from CIS PostgreSQL 15 Benchmark v1.2.0CIS PostgreSQL 15 v1.2.0 L1 OS Linux PostgreSQLDBPostgreSQLDB
CIS_PostgreSQL_15_v1.2.0_L1_OS_Linux_Unix.audit from CIS PostgreSQL 15 Benchmark v1.2.0CIS PostgreSQL 15 v1.2.0 L1 OS Linux UnixUnix
CIS_Rocky_Linux_9_v2.0.0_L1_Workstation.audit from CIS Rocky Linux 9 v2.0.0CIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix
CIS_v1.1.0_Oracle_11g_OS_Windows_Level_2.audit from CIS v1.1.0 Oracle 11gCIS v1.1.0 Oracle 11g OS Windows Level 2Windows
SP13-00-000015 - SharePoint must utilize approved cryptography to protect the confidentiality of remote access sessions.DISA Microsoft SharePoint 2013 STIG v2r4Windows

ACCESS CONTROL

SP13-00-000110 - SharePoint must ensure authentication of both client and server during the entire session. An example of this is SSL Mutual Authentication.DISA Microsoft SharePoint 2013 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000120 - SharePoint must maintain the confidentiality of information during aggregation, packaging, and transformation in preparation for transmission. When transmitting data, applications need to leverage transmission protection mechanisms such as TLS, SSL VPNs, or IPSec.DISA Microsoft SharePoint 2013 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION