1.7.10 Ensure XDMCP is not enabled | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.7.10 Ensure XDMCP is not enabled | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.8.4 Ensure XDMCP is not enabled | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.4 Ensure XDMCP is not enabled | CIS Fedora 28 Family Linux Workstation L1 v2.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDCMP is not enabled | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS SUSE Linux Enterprise 15 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS AlmaLinux OS 8 Server L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS AlmaLinux OS 8 Workstation L1 v3.0.0 | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS AlmaLinux OS 9 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
1.8.10 Ensure XDMCP is not enabled | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
1.12 Ensure Maximum number of failed attempts allowed is set to 5 or fewer | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | ACCESS CONTROL |
5.3.3.1.1 Ensure password failed attempts lockout is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.4.3 Ensure password reuse is limited - password-auth | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.3 Ensure password reuse is limited - password-auth | CIS Oracle Linux 6 Workstation L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.3 Ensure password reuse is limited - password-auth | CIS Red Hat 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.4.3 Ensure password reuse is limited - system-auth | CIS CentOS 6 Workstation L1 v3.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.5 Firewall Consideration | CIS Apple macOS 10.13 L2 v1.1.0 | Unix | CONFIGURATION MANAGEMENT |
7.11 App Store Password Settings | CIS Apple OSX 10.11 El Capitan L2 v1.1.0 | Unix | |
ALMA-09-022240 - AlmaLinux OS 9 must have the gnutls-utils package installed. | DISA CloudLinux AlmaLinux OS 9 STIG v1r1 | Unix | CONFIGURATION MANAGEMENT |
Big Sur - Enforce Session Lock After Screen Saver is Started | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Big Sur - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | IDENTIFICATION AND AUTHENTICATION |
Big Sur - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | IDENTIFICATION AND AUTHENTICATION |
BIND-9X-001702 - The BIND 9.x server implementation must prohibit the forwarding of queries to servers controlled by organizations outside of the U.S. Government. | DISA BIND 9.x STIG v2r3 | Unix | CONFIGURATION MANAGEMENT |
Catalina - Enforce Session Lock After Screen Saver is Started | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL |
CIS_Red_Hat_EL5_v2.2.1_L1.audit from Red Hat Enterprise Linux 5 Benchmark | CIS Red Hat Enterprise Linux 5 L1 v2.2.1 | Unix | |
CIS_Red_Hat_EL5_v2.2.1_L2.audit from Red Hat Enterprise Linux 5 Benchmark | CIS Red Hat Enterprise Linux 5 L2 v2.2.1 | Unix | |
CISC-RT-000510 - The Cisco BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer. | DISA STIG Cisco IOS Router RTR v3r2 | Cisco | ACCESS CONTROL |
CISC-RT-000510 - The Cisco BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer. | DISA STIG Cisco IOS XE Router RTR v3r2 | Cisco | ACCESS CONTROL |
CISC-RT-000560 - The Cisco BGP switch must be configured to use the maximum prefixes feature to protect against route table flooding and prefix de-aggregation attacks. | DISA STIG Cisco IOS XE Switch RTR v3r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
EP11-00-004900 - The EDB Postgres Advanced Server must use NIST FIPS 140-2 or 140-3 validated cryptographic modules for all cryptographic operations including generation of cryptographic hashes and data protection. | EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4 | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002320 - Audio devices must have mode 0660 or less permissive - '/dev/audio*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002320 - Audio devices must have mode 0660 or less permissive - /dev/audio* | DISA STIG Solaris 10 SPARC v2r4 | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0660 or less permissive - /dev/sound/* | DISA STIG Solaris 10 X86 v2r4 | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/audio*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002320 - Audio devices must have mode 0664 or less permissive - '/dev/snd/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002340 - Audio devices must be owned by root - '/dev/snd/*' | DISA STIG for Oracle Linux 5 v2r1 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
GEN002340 - Audio devices must be owned by root - '/dev/snd/*' | DISA STIG for Red Hat Enterprise Linux 5 v1r18 Audit | Unix | ACCESS CONTROL |
GEN002340 - Audio devices must be owned by root - /dev/audio* | DISA STIG Solaris 10 SPARC v2r4 | Unix | CONFIGURATION MANAGEMENT |
GEN002340 - Audio devices must be owned by root. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN003800 - Inetd or xinetd logging/tracing must be enabled. | DISA STIG Solaris 10 X86 v2r4 | Unix | AUDIT AND ACCOUNTABILITY |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Monterey - Enforce Session Lock After Screen Saver is Started | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Prohibit Password Reuse for a Minimum of Five Generations | NIST macOS Monterey v1.0.0 - 800-171 | Unix | IDENTIFICATION AND AUTHENTICATION |
RHEL-09-214030 - RHEL 9 must be configured so that the cryptographic hashes of system files match vendor values. | DISA Red Hat Enterprise Linux 9 STIG v2r3 | Unix | CONFIGURATION MANAGEMENT |
VCENTER-000027 - The system must set a timeout for all thick-client logins without activity. | DISA STIG VMWare ESXi vCenter 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |