1.6 Only allow trusted users to control Docker daemon | CIS Docker 1.11.0 v1.0.0 L1 Linux | Unix | ACCESS CONTROL |
1.7 Only allow trusted users to control Docker daemon | CIS Docker 1.6 v1.0.0 L1 Linux | Unix | ACCESS CONTROL |
5.4 Do not use privileged containers | CIS Docker 1.13.0 v1.0.0 L1 Docker | Unix | ACCESS CONTROL |
7.4 Restrict at/cron to authorized users (/var/at/at.allow) | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
Access Security - SSH - Deny Root logins | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
Allow user control over installs | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Allow user control over installs | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow user control over installs | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - EnableSmartScreen | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows Server v2004 MS v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Default Authentication Realm | Tenable Cisco ACI | Cisco_ACI | ACCESS CONTROL |
Disallow WinRM from storing RunAs credentials | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Enable local admin password management | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Ensure nodev option set on /dev/shm partition | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Ensure nosuid option set on /var/tmp partition | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Enumerate local users on domain-joined computers | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
ESXi : audit-exception-users | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
ESXi : enable-normal-lockdown-mode | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |
ESXi : enable-normal-lockdown-mode | VMWare vSphere 6.5 Hardening Guide | VMware | ACCESS CONTROL |
IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE' | IBM System i Security Reference for V7R2 | AS/400 | ACCESS CONTROL |
IBM i : Allow Restoring of Security-Sensitive Objects (QALWOBJRST) - '*NONE' | IBM System i Security Reference for V7R3 | AS/400 | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server 1903 DC v1.19.9 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server 1903 MS v1.19.9 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server v2004 DC v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS - SpynetReporting | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Physical Security - Console Port - Configure the insecure feature | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockLogging | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockLogging | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for standard users | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for standard users | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Detect application installations and prompt for elevation | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Authentication Security - Limit access to ## SECRET-DATA | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
User Authentication Security - Local Authentication - Limit local accounts to required users | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
VM : prevent-device-interaction-connect | VMWare vSphere 5.X Hardening Guide | VMware | ACCESS CONTROL |