Item Search

NameAudit NamePluginCategory
1.9 Ensure 'Maximum receive size: Connector level' is set to '25'CIS Microsoft Exchange Server 2019 L1 Edge v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.3 Ensure 'Maximum receive size: Organization level' is set to '25'CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.27 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.2.28 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

2.2.29 Ensure 'Deny log on as a service' to include 'Enterprise Admins Group and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG DCWindows

ACCESS CONTROL

2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v1.0.0 STIG MSWindows

ACCESS CONTROL

2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabledCIS IIS 8.0 v1.5.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabled - RC4 56/128CIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabled - RC4 64/128CIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabled - RC4 128/128CIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.13 Ensure AES 256/256 Cipher Suite is enabled - EnabledCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.13 Ensure AES 256/256 Cipher Suite is enabled - EnabledCIS IIS 8.0 v1.5.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

18.9.65.3.9.1 Ensure 'Always prompt for password upon connection' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Accounts: Guest account statusMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Allow unicast response - Private ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local connection security rules - Domain ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rules - Domain ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Apply local firewall rules - Private ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Audit Security State ChangeMSCT Windows Server 2012 R2 MS v1.0.0Windows

AUDIT AND ACCOUNTABILITY

Create permanent shared objectsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Create Symbolic LinksMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Default Protections for Popular Software - 7zFMMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Popular Software - RealConverterMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Popular Software - VLCMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Popular Software - WinRARGUIMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - AcrobatMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - AcrobatReaderMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - InfoPathMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - OutlookMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - PowerPointMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - VisioMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Deny log on as a batch jobMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Deny log on locallyMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Devices: Allowed to format and eject removable mediaMSCT Windows Server 2012 R2 MS v1.0.0Windows

MEDIA PROTECTION

Devices: Prevent users from installing printer driversMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Domain member: Maximum machine account password ageMSCT Windows Server 2012 R2 MS v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Force specific screen saverMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Generate security auditsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Inbound Connections - Private ProfileMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Interactive logon: Do not require CTRL+ALT+DELMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

WN12-00-000100 - The Windows 2012 / 2012 R2 system must use an anti-virus program.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-CC-000139 - Windows 2012 R2 must include command line data in process creation events.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-SO-000042 - IPSec Exemptions must be limited.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT