Item Search

NameAudit NamePluginCategory
1.2.2 Set 'transport input ssh' for 'line vty' connectionsCIS Cisco IOS 15 L1 v4.1.1Cisco

IDENTIFICATION AND AUTHENTICATION

1.2.3 Set 'no exec' for 'line aux 0'CIS Cisco IOS 15 L1 v4.1.1Cisco

SYSTEM AND INFORMATION INTEGRITY

1.2.11 Set 'transport input none' for 'line aux 0'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.3.1 Set the 'banner-text' for 'banner exec'CIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL

1.3.3 Set the 'banner-text' for 'banner motd'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.4.1 Set 'password' for 'enable secret'CIS Cisco IOS 12 L1 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION

1.5.1 Set 'no snmp-server' to disable SNMP when unusedCIS Cisco IOS 15 L1 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.3 Unset 'public' for 'snmp-server community'CIS Cisco IOS 15 L1 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.1.1.5 Set maximimum value for 'ip ssh authentication-retries'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Set 'no service dhcp'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Set 'no service dhcp' - dhcp poolCIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.6 Set 'service timestamps debug datetime'CIS Cisco IOS 15 L1 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

3.1.4 Set 'ip verify unicast source reachable-via'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.4.3 Use Unicast Routing Protocols OnlyCIS Cisco NX-OS L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.168.0.0'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.1 Set 'key chain'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.2 Set 'key'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.8 Set 'ip authentication key-chain eigrp'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.3.5 Set 'ip rip authentication mode' to 'md5'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.4.1 Set 'neighbor password'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Configure IPsec Tunnel Parameters - cipher-suiteTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

Ensure 'aaa local authentication max failed attempts' is set to less than or equal to '3'Tenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL

Ensure 'EIGRP authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'HTTP session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure 'SNMP traps' is enabled - authenticationTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkdownTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkupTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure email logging is configured for critical to emergencyTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

ESXI5-VMNET-000009 - All port groups must be configured with a clear network label.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

GEN000000-AIX00020 - AIX Trusted Computing Base (TCB) software must be implemented.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL, SYSTEM AND SERVICES ACQUISITION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN000750 - The system must require at least four characters be changed between the old and new passwords during a password change.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN000930 - The root account's home directory must not have an extended ACL.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001120 - The system must not permit root logins using remote access programs, such as ssh.DISA STIG AIX 5.3 v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN001140 - System files and directories must not have uneven access permissions - '/usr/lbin'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001220 - All system files, programs, and directories must be owned by a system account - '/usr/sbin/*'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN001260 - System log files must have mode 0640 or less permissive - '/var/log/*'DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/infopage/*'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN001280 - Manual page files must have mode 0644 or less permissive - '/usr/share/man/*'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

Identification and Authentication - Use out of band authentication - AAA - audit loggingTenable Cisco Viptela SD-WAN - vSmartCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

Identification and Authentication - Use out of band authentication - Admin Authentication OrderTenable Cisco Viptela SD-WAN - vSmartCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

Identification and Authentication - Use out of band authentication - Admin Authentication OrderTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

IDENTIFICATION AND AUTHENTICATION

Secure Name/address Resolution Service - Configure DNS servers - PrimaryTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Secure Name/address Resolution Service - Configure DNS servers - PrimaryTenable Cisco Viptela SD-WAN - vManageCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Secure Name/address Resolution Service - Configure DNS servers - SecondaryTenable Cisco Viptela SD-WAN - vBondCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Session Termination - Configure Idle CLI timeoutTenable Cisco Viptela SD-WAN - vBondCisco_Viptela

ACCESS CONTROL

SRG-OS-000145-ESXI5 - The system must be configured with a default gateway for IPv4 if the system uses IPv4, unless the system is a router.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

System Backup - Enable Backups - intervalTenable Cisco Viptela SD-WAN - vManageCisco_Viptela

CONTINGENCY PLANNING

System Backup - Enable Backups - pathTenable Cisco Viptela SD-WAN - vBondCisco_Viptela

CONTINGENCY PLANNING