Item Search

NameAudit NamePluginCategory
1.1.2 Enable 'aaa authentication login'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.6.3 Configure Netflow on Strategic PortsCIS Cisco NX-OS L2 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY, INCIDENT RESPONSE, SYSTEM AND INFORMATION INTEGRITY

3.1.4.4 Configure HSRP protectionsCIS Cisco NX-OS L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

5.9 (L1) Host must restrict access to a default or native VLAN on standard virtual switchesCIS VMware ESXi 8.0 v1.1.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 (L1) Ensure port groups are not configured to the value of the native VLANCIS VMware ESXi 7.0 v1.4.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure port groups are not configured to the value of the native VLANCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND INFORMATION INTEGRITY

7.4 Ensure port groups are not configured to the value of the native VLANCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-L3-000320 - The Arista Multilayer Switch must not enable the RIP routing protocol.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

IDENTIFICATION AND AUTHENTICATION

ARST-L2-000150 - The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-L2-000160 - The Arista MLS layer 2 switch must have all trunk links enabled statically.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

CISC-ND-000600 - The Cisco switch must be configured to enforce password complexity by requiring that at least one special character be used.DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-001030 - The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.DISA STIG Cisco IOS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001050 - The Cisco switch must be configured to record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).DISA STIG Cisco NX-OS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001260 - The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA STIG Cisco IOS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001260 - The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA STIG Cisco IOS XE Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-RT-000020 - The Cisco switch must be configured to implement message authentication for all control plane protocols.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000240 - The Cisco perimeter switch must be configured to deny network traffic by default and allow network traffic by exception.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000390 - The Cisco perimeter switch must be configured to block all outbound management traffic.DISA STIG Cisco NX-OS Switch RTR v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter switch must be configured to drop IPv6 undetermined transport packets.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DISA_F5_BIG-IP_Device_Management_v2r3.audit from DISA F5 BIG-IP Device Management v2r3 STIGDISA F5 BIG-IP Device Management STIG v2r3F5
DISA_STIG_Adobe_Acrobat_Pro_DC_Classic_Track_v2r1.audit from DISA Adobe Acrobat Professional DC Classic Track v2r1 STIGDISA STIG Adobe Acrobat Pro DC Classic Track v2r1Windows
DISA_STIG_Adobe_Acrobat_Reader_DC_Continuous_Track_v2r1.audit from DISA Adobe Acrobat Reader DC Continuous Track v2r1 STIGDISA STIG Adobe Acrobat Reader DC Continuous Track v2r1Windows
DISA_STIG_Apache_Server-2.2_Windows_v1r13.audit from DISA APACHE 2.2 Server for Windows v1r13 STIGDISA STIG Apache Server 2.2 Windows v1r13Windows
DISA_STIG_Apache_Server-2.4_Unix_v3r1.audit from DISA Apache Server 2.4 UNIX Server v3r1 STIGDISA STIG Apache Server 2.4 Unix Server v3r1Unix
DISA_STIG_Apache_Server-2.4_Windows_v2r3.audit from DISA Apache Server 2.4 Windows Server v2r3 STIGDISA STIG Apache Server 2.4 Windows Server v2r3Windows
DISA_STIG_Apache_Site-2.4_Windows_v2r1.audit from DISA Apache Server 2.4 Windows Site v2r1 STIGDISA STIG Apache Server 2.4 Windows Site v2r1Windows
DISA_STIG_EDB_PostgreSQL_Advanced_Server_v11_Windows_v2r4_OS.audit from DISA EDB Postgres Advanced Server v11 on Windows v2r4 STIGEDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows
DISA_STIG_Microsoft_Exchange_2013_Client_Access_Server_v2r2.audit from DISA Microsoft Exchange 2013 Client Access Server v2r2 STIGDISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

DISA_STIG_Microsoft_Exchange_2013_Edge_Transport_Server_v1r6.audit from DISA Microsoft Exchange 2013 Edge Transport Server v1r6 STIGDISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

DISA_STIG_MongoDB_Enterprise_Advanced_3.x_DB_v2r3.audit from DISA MongoDB Enterprise Advanced 3.x v2r3 STIGDISA STIG MongoDB Enterprise Advanced 3.x v2r3 DBMongoDB
DISA_STIG_MongoDB_Enterprise_Advanced_3.x_OS_Linux_v2r3.audit from DISA MongoDB Enterprise Advanced 3.x v2r3 STIGDISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix
DISA_STIG_MongoDB_Enterprise_Advanced_4.x_DB_v1r4.audit from DISA MongoDB Enterprise Advanced 4.x v1r4 STIGDISA STIG MongoDB Enterprise Advanced 4.x v1r4 DBMongoDB
DISA_STIG_MongoDB_Enterprise_Advanced_4.x_OS_v1r4.audit from DISA MongoDB Enterprise Advanced 4.x v1r4 STIGDISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix
DISA_STIG_MSSQL_2014_Instance-OS_v2r4.audit from DISA MS SQL Server 2014 Instance v2r4 STIGDISA STIG SQL Server 2014 Instance OS Audit v2r4Windows
DISA_STIG_Red_Hat_Enterprise_Linux_9_v2r2.audit from DISA Red Hat Enterprise Linux 9 v2r2 STIGDISA Red Hat Enterprise Linux 9 STIG v2r2Unix
DISA_STIG_RHEL_6_v2r2.audit from DISA Red Hat Enterprise Linux 6 v2r2 STIGDISA Red Hat Enterprise Linux 6 STIG v2r2Unix
DISA_STIG_VMware_vSphere_7.0_vCA_Perfcharts_v1r1.audit from DISA VMware vSphere 7.0 vCenter Appliance Perfcharts v1r1 STIGDISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix
DISA_STIG_VMware_vSphere_7.0_vCA_UI_v1r2.audit from DISA VMware vSphere 7.0 vCenter Appliance UI v1r2 STIGDISA STIG VMware vSphere 7.0 vCA UI v1r2Unix
VCSA-70-000274 - The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000274 The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.DISA VMware vSphere 8.0 vCenter STIG v2r1VMware

CONFIGURATION MANAGEMENT

VCTR-67-000020 - The vCenter Server must not configure all port groups to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000020 - All port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000020 - The vCenter Server for Windows must not configure all port groups to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

vNetwork : no-reserved-vlansVMWare vSphere 5.X Hardening GuideVMware