Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 5 of 28
• 1384 Total
Next
Next ››
Name
Audit Name
Plugin
Category
APPL-11-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs).
DISA STIG Apple macOS 11 v1r3
Unix
APPL-11-000031 - The macOS system must be configured so that log folders must not contain access control lists (ACLs).
DISA STIG Apple macOS 11 v1r7
Unix
APPL-11-001013 - The macOS system must be configured with audit log folders owned by root.
DISA STIG Apple macOS 11 v1r7
Unix
APPL-11-001014 - The macOS system must be configured with audit log files group-owned by wheel.
DISA STIG Apple macOS 11 v1r1
Unix
APPL-11-001014 - The macOS system must be configured with audit log files group-owned by wheel.
DISA STIG Apple macOS 11 v1r3
Unix
APPL-11-001015 - The macOS system must be configured with audit log folders group-owned by wheel.
DISA STIG Apple macOS 11 v1r1
Unix
APPL-11-001015 - The macOS system must be configured with audit log folders group-owned by wheel.
DISA STIG Apple macOS 11 v1r6
Unix
APPL-11-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.
DISA STIG Apple macOS 11 v1r3
Unix
APPL-11-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.
DISA STIG Apple macOS 11 v1r6
Unix
APPL-12-001012 - The macOS system must be configured with audit log files owned by root.
DISA STIG Apple macOS 12 v1r5
Unix
APPL-12-001013 - The macOS system must be configured with audit log folders owned by root.
DISA STIG Apple macOS 12 v1r8
Unix
APPL-12-001013 - The macOS system must be configured with audit log folders owned by root.
DISA STIG Apple macOS 12 v1r3
Unix
APPL-12-001013 - The macOS system must be configured with audit log folders owned by root.
DISA STIG Apple macOS 12 v1r4
Unix
APPL-12-001014 - The macOS system must be configured with audit log files group-owned by wheel.
DISA STIG Apple macOS 12 v1r5
Unix
APPL-12-001014 - The macOS system must be configured with audit log files group-owned by wheel.
DISA STIG Apple macOS 12 v1r8
Unix
APPL-12-001015 - The macOS system must be configured with audit log folders group-owned by wheel.
DISA STIG Apple macOS 12 v1r8
Unix
APPL-12-001015 - The macOS system must be configured with audit log folders group-owned by wheel.
DISA STIG Apple macOS 12 v1r3
Unix
APPL-12-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.
DISA STIG Apple macOS 12 v1r4
Unix
APPL-12-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.
DISA STIG Apple macOS 12 v1r8
Unix
APPL-13-000031 - The macOS system must be configured so that log folders do not contain access control lists (ACLs).
DISA STIG Apple macOS 13 v1r2
Unix
APPL-13-001012 - The macOS system must be configured with audit log files owned by root.
DISA STIG Apple macOS 13 v1r2
Unix
APPL-13-001012 - The macOS system must be configured with audit log files owned by root.
DISA STIG Apple macOS 13 v1r3
Unix
APPL-13-001013 - The macOS system must be configured with audit log folders owned by root.
DISA STIG Apple macOS 13 v1r3
Unix
APPL-13-001013 - The macOS system must be configured with audit log folders owned by root.
DISA STIG Apple macOS 13 v1r1
Unix
APPL-13-001014 - The macOS system must be configured with audit log files group-owned by wheel.
DISA STIG Apple macOS 13 v1r2
Unix
APPL-13-001014 - The macOS system must be configured with audit log files group-owned by wheel.
DISA STIG Apple macOS 13 v1r3
Unix
APPL-13-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.
DISA STIG Apple macOS 13 v1r2
Unix
APPL-13-001016 - The macOS system must be configured with audit log files set to mode 440 or less permissive.
DISA STIG Apple macOS 13 v1r3
Unix
FNFG-FW-000050 - The FortiGate firewall must protect traffic log records from unauthorized access while in transit to the central audit server. - set mode
DISA Fortigate Firewall STIG v1r1
FortiGate
JBOS-AS-000165 - File permissions must be configured to protect log information from any type of unauthorized read access.
DISA RedHat JBoss EAP 6.3 STIG v1r4
Unix
MADB-10-002000 - The audit information produced by MariaDB must be protected from unauthorized read access.
DISA MariaDB Enterprise 10.x v1r3 DB
MySQLDB
MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access - audit.log
DISA Oracle MySQL 8.0 v1r1 OS Linux
Unix
MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access - audit.log
DISA Oracle MySQL 8.0 v1r3 OS Linux
Unix
MYS8-00-001200 - The audit information produced by the MySQL Database Server 8.0 must be protected from unauthorized read access - data directory
DISA Oracle MySQL 8.0 v1r2 OS Linux
Unix
PHTN-30-000016 - The Photon operating system audit log must have correct permissions.
DISA STIG VMware vSphere 7.0 Photon OS v1r2
Unix
PHTN-67-000015 - The Photon operating system audit log must have correct permissions.
DISA STIG VMware vSphere 6.7 Photon OS v1r1
Unix
RHEL-08-030070 - RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r11
Unix
RHEL-08-030070 - RHEL 8 audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r9
Unix
RHEL-08-030080 - RHEL 8 audit logs must be owned by root to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r6
Unix
RHEL-08-030100 - RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r8
Unix
RHEL-08-030100 - RHEL 8 audit log directory must be owned by root to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
RHEL-08-030110 - RHEL 8 audit log directory must be group-owned by root to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r5
Unix
RHEL-08-030120 - RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r7
Unix
RHEL-08-030120 - RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r8
Unix
RHEL-08-030120 - RHEL 8 audit log directory must have a mode of 0700 or less permissive to prevent unauthorized read access.
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
RHEL-08-030121 - RHEL 8 audit system must protect auditing rules from unauthorized change.
DISA Red Hat Enterprise Linux 8 STIG v1r5
Unix
RHEL-08-030122 - RHEL 8 audit system must protect logon UIDs from unauthorized change.
DISA Red Hat Enterprise Linux 8 STIG v1r13
Unix
RHEL-08-030122 - RHEL 8 audit system must protect logon UIDs from unauthorized change.
DISA Red Hat Enterprise Linux 8 STIG v1r6
Unix
UBTU-20-010123 - The Ubuntu operating system must be configured to permit only authorized users ownership of the audit log files.
DISA STIG Ubuntu 20.04 LTS v1r10
Unix
WN11-AU-000520 - Windows 11 permissions for the Security event log must prevent access by non-privileged accounts.
DISA Windows 11 STIG v1r5
Windows
‹‹ Previous
Previous
Page 5 of 28
• 1384 Total
Next
Next ››