1.1.3.1.1 Set 'Accounts: Block Microsoft accounts' to 'Users can't add or log on with Microsoft accounts' | CIS Windows 8 L1 v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
1.1.3.1.6 Set 'Accounts: Limit local account use of blank passwords to console logon only' to 'Enabled' | CIS Windows 8 L1 v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
1.1.23 Ensure that the --service-account-lookup argument is set to true | CIS Kubernetes 1.11 Benchmark v1.3.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
1.1.24 Ensure that the --service-account-lookup argument is set to true | CIS Kubernetes 1.7.0 Benchmark v1.1.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
2.3.1.3 Ensure 'Accounts: Limit local account use of blank passwords to console logon only' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.7.5 Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' | CIS Windows 7 Workstation Level 2 v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.7.5 Ensure 'Interactive logon: Number of previous logons to cache (in case domain controller is not available)' is set to '4 or fewer logon(s)' | CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.7.6 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.7.6 Ensure 'Interactive logon: Prompt user to change password before expiration' is set to 'between 5 and 14 days' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.4 Ensure an industry standard authentication mechanism is used - mode | CIS MongoDB 3.2 L2 Unix Audit v1.0.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
3.1.16 Ensure that the --service-account-lookup argument is set to true | CIS Kubernetes 1.8 Benchmark v1.2.0 L1 | Unix | IDENTIFICATION AND AUTHENTICATION |
5.1.8 Ensure at/cron is restricted to authorized users - '/etc/at.allow' | CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0 | Unix | ACCESS CONTROL |
18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
18.9.15.1 Ensure 'Do not display the password reveal button' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
18.9.15.1 Ensure 'Do not display the password reveal button' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
18.9.15.2 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server 1903 MS v1.19.9 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server 2016 MS v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server 2019 DC v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server v1909 MS v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server v2004 DC v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server v2004 MS v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows Server v20H2 MS v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Accounts: Limit local account use of blank passwords to console logon only | MSCT Windows 10 v20H2 v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Ensure at/cron is restricted to authorized users - cron.allow | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Enumerate administrator accounts on elevation | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Enumerate administrator accounts on elevation | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
MSS: (AutoAdminLogon) Enable Automatic Logon (Not Recommended) | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
MSS: (AutoAdminLogon) Enable Automatic Logon (Not Recommended) | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server v2004 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 1903 MS v1.19.9 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server 1903 MS v1.19.9 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server v1909 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server v2004 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server v2004 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts and shares | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |