2.1 Enable Secure Admin Access - 'telnet.distinct.enable = on' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' | CIS Windows Server 2012 R2 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only) | CIS Windows Server 2012 R2 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.17.2 (L1) Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higher | CIS Windows Server 2012 R2 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.17.6 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' | CIS Windows Server 2012 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
3.3.1 Establish DAS administrative group | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows | Windows | ACCESS CONTROL |
4.3 Block users from viewing unowned processes | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
4.3 Review Users, Groups, and Roles - Groups list | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
4.4 Block users from viewing processes in other groups | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
4.13 listener.ora - 'admin_restrictions_listener_name = on' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL |
6.5 Find SUID and SGID files (/usr/bin) | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
6.5 Find SUID and SGID files (/usr/compat/) | CIS FreeBSD v1.0.5 | Unix | ACCESS CONTROL |
12.04 Oracle DBA group membership on host - 'Review' | CIS v1.1.0 Oracle 11g OS L1 | Unix | ACCESS CONTROL |
18.9.27.1 (L1) Ensure 'Do not display network selection UI' is set to 'Enabled' | CIS Windows Server 2012 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
18.9.27.5 (L1) Ensure 'Turn off picture password sign-in' is set to 'Enabled' | CIS Windows Server 2012 R2 MS L1 v3.0.0 | Windows | ACCESS CONTROL |
Apply UAC restrictions to local accounts on network logons | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Apply UAC restrictions to local accounts on network logons | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
Brocade - SCP server host is approved | Tenable Best Practices Brocade FabricOS | Brocade | ACCESS CONTROL |
Configure Windows Defender SmartScreen - EnableSmartScreen | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows Server 1903 DC v1.19.9 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Disallow WinRM from storing RunAs credentials | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Ensure nodev option set on /tmp partition | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Enumerate local users on domain-joined computers | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
ESXi : enable-strict-lockdown-mode | VMWare vSphere 6.5 Hardening Guide | VMware | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 10 1903 v1.19.9 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 10 1909 v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows Server 1903 MS v1.19.9 | Windows | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows Server v1909 MS v1.0.0 | Windows | ACCESS CONTROL |
Network security: Allow LocalSystem NULL session fallback | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Network security: Allow LocalSystem NULL session fallback | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Recovery console: Allow automatic administrative logon | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Turn off toast notifications on the lock screen | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockLogging | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockLogging | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 11 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Detect application installations and prompt for elevation | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Only elevate UIAccess applications that are installed in secure locations | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
VM : prevent-device-interaction-edit | VMWare vSphere 6.0 Hardening Guide | VMware | ACCESS CONTROL |