Item Search

NameAudit NamePluginCategory
3.2 Disable the Shutdown portCIS Apache Tomcat 10 L2 v1.1.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Disable the Shutdown portCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Disable the Shutdown portCIS Apache Tomcat 9 L2 v1.2.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2 Disable the Shutdown portCIS Apache Tomcat 10 L2 v1.1.0 MiddlewareUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.1.2 Ensure nftables is not installed with iptablesCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.2 Ensure iptables-services not installed with firewalldCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1.3 Ensure nftables either not installed or masked with firewalld - maskedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.3 Ensure iptables-services not installed with nftablesCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2.3 Ensure iptables-services not installed with nftablesCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

9.1.4 (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

9.1.5 (L1) Ensure 'Windows Firewall: Domain: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\domainfw.log'CIS Windows Server 2012 MS L1 v3.0.0Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

9.1.7 (L1) Ensure 'Windows Firewall: Domain: Logging: Log dropped packets' is set to 'Yes'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

9.3.7 (L1) Ensure 'Windows Firewall: Public: Logging: Name' is set to '%SystemRoot%\System32\logfiles\firewall\publicfw.log'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

9.3.8 (L1) Ensure 'Windows Firewall: Public: Logging: Size limit (KB)' is set to '16,384 KB or greater'CIS Windows Server 2012 MS L1 v3.0.0Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.allowDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.allowDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.allowDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.allowDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.denyDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.denyDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.denyDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN005540 - The SSH daemon must be configured for IP filtering - hosts.denyDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.allowDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.allowDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.allowDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.allowDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.denyDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.denyDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.denyDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006080 - The Samba Web Administration Tool (SWAT) must be restricted to the local host or require SSL - hosts.denyDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - default denyDISA STIG Solaris 10 SPARC v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - default denyDISA STIG Solaris 10 SPARC v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - default denyDISA STIG Solaris 10 X86 v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN006620 - The system's access control program must be configured to grant or deny system access to specific hosts - default denyDISA STIG Solaris 10 X86 v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN008540 - The system's local firewall must implement a deny-all, allow-by-exception policy.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000240 - The Juniper perimeter router must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Juniper Router RTR v1r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-RT-000270 - The Juniper perimeter router must be configured to block inbound packets with source Bogon IP address prefixes - filterDISA STIG Juniper Router RTR v1r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Control Connections to Other Systems via a Deny-All and Allow-by-Exception Firewall PolicyNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

O112-BP-025600 - Network access to the DBMS must be restricted to authorized personnel - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O112-BP-025600 - Network access to the DBMS must be restricted to authorized personnel - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C3-019200 - The DBMS must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

O112-C3-019200 - The DBMS must restrict the ability of users to launch Denial of Service (DoS) attacks against other information systems or networks - TCP.VALIDNODE_CHECKINGDISA STIG Oracle 11.2g v1r18 WindowsWindows

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000570 - Symantec ProxySG must deny network communications traffic by default and allow network communications traffic by exception (i.e., deny all, permit by exception).DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION