Item Search

NameAudit NamePluginCategory
1.1.3.11.15 Set 'Network Security: Configure encryption types allowed for Kerberos' to 'RC4\AES128\AES256\Future types'CIS Windows 8 L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.7.2 Ensure 'TLS 1.0' is set for HTTPS accessCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.7.2 Ensure 'TLS 1.2' is set for HTTPS accessCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

1.7.3 Ensure 'SSL AES 256 encryption' is set for HTTPS accessCIS Cisco Firewall v8.x L1 v4.2.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 18c Windows v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.9 Ensure 'Network security: Minimum session security for NTLM SSP based (including secure RPC) clients' is set to 'Require NTLMv2 session security, Require 128-bit encryption'CIS Windows 7 Workstation Level 1 v3.2.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.5.1 Ensure 'VPN' is 'Configured'AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

2.5.1 Ensure 'VPN' is 'Configured'MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.1 Ensure 'VPN' is 'Configured'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 4 L1 OS Windows v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Weak Protocols are DisabledCIS MongoDB 5 L1 OS Linux v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption)CIS MongoDB 4 L1 OS Windows v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Ensure Encryption of Data in Transit TLS or SSL (Transport Encryption)CIS MongoDB 5 L1 OS Windows v1.2.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.1 Ensure SSH is installedCIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.12 Ensure only strong Ciphers are usedCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.12 Ensure only strong Ciphers are usedCIS Debian Family Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.13 Ensure only strong Ciphers are usedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.14 Ensure only strong Ciphers are used - approved ciphersCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.14 Ensure only strong Ciphers are used - approved ciphersCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.14 Ensure only strong Ciphers are used - weak ciphersCIS CentOS 6 Workstation L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - approved algorithmsCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshdCIS Oracle Linux 6 Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.6 Ensure AES128 is set for all SNMPv3 usersCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Ensure secure is set to true only for SSL-enabled ConnectorsCIS Apache Tomcat 10 L1 v1.1.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.4 Ensure secure is set to true only for SSL-enabled ConnectorsCIS Apache Tomcat 10.1 v1.0.0 L1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

10.4 Force SSL when accessing the manager applicationCIS Apache Tomcat 8 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

10.4 Force SSL when accessing the manager applicationCIS Apache Tomcat 8 L1 v1.1.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

10.12 Force SSL for all applicationsCIS Apache Tomcat 8 L2 v1.1.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows 10 v20H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows Server 2012 R2 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows 10 1903 v1.19.9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows Server v20H2 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows Server 1903 MS v1.19.9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows Server v2004 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) clientsMSCT Windows Server v2004 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows Server 1903 DC v1.19.9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows Server v2004 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows 10 1809 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows 10 v2004 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows 10 v20H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows Server 2012 R2 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows Server 2016 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Network security: Minimum session security for NTLM SSP based (including secure RPC) serversMSCT Windows Server 2019 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION