Item Search

NameAudit NamePluginCategory
1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.27 Ensure 'Guest profiles' do not existAirWatch - CIS Google Android 7 v1.0.0 L1MDM
1.27 Ensure 'Guest profiles' do not existMobileIron - CIS Google Android 7 v1.0.0 L1MDM
2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key'CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.5 Ensure 'Simple TCP/IP Services (simptcp)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - password shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

20.20 Ensure 'DoD Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systemsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.57 Ensure 'Server Message Block (SMB) v1 protocol must not be installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.57 Ensure 'Server Message Block (SMB) v1 protocol must not be installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.57 Ensure 'Server Message Block (SMB) v1 protocol must not be installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

ARST-RT-000300 - The PE router must be configured to enforce a Quality-of-Service (QoS) policy to limit the effects of packet flooding denial-of-service (DoS) attacks.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000610 - The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA STIG Cisco IOS Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-001140 - The Cisco router must be configured to encrypt SNMP messages using a FIPS 140-2 approved algorithm.DISA STIG Cisco IOS Router NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-001150 - The Cisco router must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.DISA STIG Cisco IOS XE Router NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

Ensure timezone is properly configuredTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

First Hop Security - Source Guard - Admin StatusTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT

Port security auto-recoveryArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

Prevent enabling lock screen cameraMSCT Windows Server 2022 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v20H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 1903 DC v1.19.9Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 1903 MS v1.19.9Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server v1909 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2012 R2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 1803 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2016 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT MSCT Windows Server 2022 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v1507 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen camera - NoLockScreenCameraMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

SHPT-00-000760 - SharePoint must implement security functions as largely independent modules to avoid unnecessary interactions between modules - No Applications assigned to Default App PoolDISA STIG SharePoint 2010 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Syslog Remote Destination - HostTenable Cisco ACICisco_ACI

AUDIT AND ACCOUNTABILITY

VCTR-67-000015 - The vCenter Server must set the distributed port group Promiscuous Mode policy to reject.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000015 - The system must ensure the distributed port group Promiscuous Mode policy is set to reject.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000015 - The vCenter Server for Windows must set the distributed port group Promiscuous Mode policy to reject.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

vNetwork : reject-forged-transmit-dvportgroupVMWare vSphere 6.0 Hardening GuideVMware
vNetwork : reject-forged-transmit-dvportgroupVMWare vSphere 6.5 Hardening GuideVMware
vNetwork : reject-mac-changes-dvportgroupVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-promiscuous-mode-dvportgroupVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-promiscuous-mode-dvportgroupVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

WG610 W22 - Web sites must utilize ports, protocols, and services according to PPSM guidelines.DISA STIG Apache Site 2.2 Windows v1r13Windows