Item Search

NameAudit NamePluginCategory
1.1.3 Ensure nodev option set on /tmp partitionCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

1.1.13 Ensure nodev option set on /home partitionCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

ACCESS CONTROL

1.1.14 Ensure nodev option set on /run/shm partitionCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

ACCESS CONTROL

1.5.2 Ensure core dumps are restrictedCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

ACCESS CONTROL

1.5.3 Ensure core dumps are restrictedCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

2.3.5.1 (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only)CIS Microsoft Windows Server 2019 v3.0.1 L1 DCWindows

ACCESS CONTROL

2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.5 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.10.5 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.10.9 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'CIS Microsoft Windows Server 2019 v3.0.1 L1 DCWindows

ACCESS CONTROL

2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.2 Ensure 'User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.17.3 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Microsoft Windows Server 2019 v3.0.1 L1 DCWindows

ACCESS CONTROL

2.3.17.5 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.17.7 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'CIS Microsoft Windows Server 2022 v3.0.0 L1 Member ServerWindows

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_SETID_ENABLED is set to noCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.5 Review User-Defined RolesCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - userAdminCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

5.2 Restrict Set-UID on User Mounted Devices - Check if nosuid option is set in /etc/rmmount.conf.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

5.4.2.1 Ensure root is the only UID 0 accountCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

ACCESS CONTROL

5.4.2.1 Ensure root is the only UID 0 accountCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

ACCESS CONTROL

8.2.6 Prevent unauthorized removal and modification of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

8.2.6 Prevent unauthorized removal, connection, and modification of devicesCIS VMware ESXi 5.1 v1.0.1 Level 1VMware

ACCESS CONTROL

10.3 Restrict access to power management functions - PMCHANGEPERMCIS Solaris 10 L2 v5.2Unix

ACCESS CONTROL

10.4 Restrict access to sys-suspend featureCIS Solaris 10 L2 v5.2Unix

ACCESS CONTROL

18.7.10 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

18.9.27.2 (L1) Ensure 'Do not display network selection UI' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

18.10.80.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

20.43 Ensure 'Organization created Active Directory Organizational Unit (OU) objects have proper access control permissions' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

Access Security - SSH - Deny Root loginsJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

Allow user control over installsMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

Always install with elevated privilegesMSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

Configure Windows Defender SmartScreen - ShellSmartScreenLevelMSCT Windows 10 v20H2 v1.0.0Windows

ACCESS CONTROL

Do not show AutoRepublish warning alertMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

ACCESS CONTROL

IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE'IBM System i Security Reference for V7R2AS/400

ACCESS CONTROL

IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

Network access: Restrict clients allowed to make remote calls to SAMMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

Network access: Restrict clients allowed to make remote calls to SAMMSCT Windows 10 v21H2 v1.0.0Windows

ACCESS CONTROL

Physical Security - Console Port - Configure the insecure featureJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLoggingMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

User Account Control: Only elevate UIAccess applications that are installed in secure locationsMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

User Account Control: Run all administrators in Admin Approval ModeMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

User Authentication Security - Limit access to ## SECRET-DATAJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

User Authentication Security - Local Authentication - Limit local accounts to required usersJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL