Item Search

NameAudit NamePluginCategory
3.1.13 Ensure 'Additional email addresses' is Configured with a Security Contact EmailCIS Microsoft Azure Foundations v3.0.0 L1microsoft_azure

INCIDENT RESPONSE

6.10 Ensure NAT Gateways are created in at least 2 Availability Zones - Subnet1CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - opera.exe 2CIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.52.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

18.10.50.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.51.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

CONFIGURATION MANAGEMENT

19.7.40.1 (L1) Ensure 'Turn off Windows Copilot' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

67.3 (L2) Ensure 'Disable One Drive File Sync' is set to 'Sync Disabled'CIS Microsoft Intune for Windows 11 v3.0.1 L2Windows

CONFIGURATION MANAGEMENT

Android Compliance Policy - Block USB debugging on deviceTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Compliance Policy - Required password typeTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Browser Pop-upsTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Device Configuration - NFCTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Removable storageTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Wi-Fi tetheringTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Copy and paste between work and personal profilesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Prevent app installations from unknown sources in the personal profileTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Compliance Policy - Block Simple PasswordsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Compliance Policy - Number of non-alphanumeric characters in passwordTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Configuration profile changesTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Device name modificationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Explicit iTunes music, podcast, or news contentTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Join Wi-Fi networks only using configuration profilesTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Personal HotspotTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Safari fraud warningsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Safari Pop-upsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Simple passwordsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Siri DisabledTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

CONFIGURATION MANAGEMENT

iOS Device Management - Treat AirDrop as an unmanaged destinationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Viewing corporate documents in unmanaged appsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Compliance Policy - Block Simple PasswordsTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Compliance Policy - Require a password to unlock devices.Tenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - FirewallTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

VCPG-67-000015 - VMware Postgres must use FIPS 140-2 approved TLS ciphers.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

IDENTIFICATION AND AUTHENTICATION

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

Windows Compliance Policy - Encryption of data storage on deviceTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL

Windows Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Browser AutofillTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Device name modificationTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL

Windows Device Configuration - PasswordTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Real-time monitoringTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT

Windows Device Configuration - Scan incoming mail messagesTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT

Windows Device Configuration - SystemTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT