Item Search

NameAudit NamePluginCategory
1.1.4.4.1 Ensure peer to peer connection while only 2 people in a meeting is set to disabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.1.22 Disable AutomountingCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

MEDIA PROTECTION

1.1.27 Disable AutomountingCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L2 WorkstationUnix

MEDIA PROTECTION

1.1.27 Disable AutomountingCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

MEDIA PROTECTION

1.3 Configure SSH - Check if Protocol is set to 2 and not commented for server.CIS Solaris 9 v1.3Unix
2.2.3 Ensure CUPS is not enabledCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure CUPS is not enabledCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure CUPS is not enabledCIS Debian 8 Workstation L2 v2.0.2Unix

CONFIGURATION MANAGEMENT

2.2.4 Ensure CUPS is not enabledCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

CONFIGURATION MANAGEMENT

3.10.25.1 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v3.0.1 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.8 Remove setuid and setgid permissions in the imagesCIS Docker 1.12.0 v1.0.0 L2 DockerUnix
4.29 cman.ora - 'remote_admin = NO'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

CONFIGURATION MANAGEMENT

5.26 sqlnet.ora - 'ssl_server_dn_match = YES'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

CONFIGURATION MANAGEMENT

8.4.5 Disable AutologonCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

ACCESS CONTROL

8.4.6 Ensure BIOS BBS is disabledCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.4.11 Disable Unity Push UpdateCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.16 Disable Trash Folder StateCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.17 Disable Guest Host Interaction Tray IconCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.18 Ensure Unity is disabledCIS VMware ESXi 6.5 v1.0.0 Level 2VMware

SYSTEM AND INFORMATION INTEGRITY

8.4.20 Disable GetCredsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.22 Disable Guest Host Interaction Launch MenuCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.23 Disable memSchedFakeSampleStatsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

18.6.8.1 (L1) Ensure 'Enable insecure guest logons' is set to 'Disabled'CIS Microsoft Windows Server 2022 v3.0.0 L1 Member ServerWindows

CONFIGURATION MANAGEMENT

18.6.8.1 (L1) Ensure 'Enable insecure guest logons' is set to 'Disabled'CIS Microsoft Windows Server 2022 v3.0.0 L1 Domain ControllerWindows

CONFIGURATION MANAGEMENT

18.7.1 (L1) Ensure 'Allow Print Spooler to accept client connections' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BLWindows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.9.28.1 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.9.28.1 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.9.28.1 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v3.0.0 L1 + BLWindows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.9.28.1 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

18.9.28.1 (L1) Ensure 'Block user from showing account details on sign-in' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NGWindows

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

Add workstations to a domainMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

AIX7-00-002111 - AIX SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

CIS_MS_SERVER_2012_Level_2_v3.0.0.audit from CIS Security Benchmark For Microsoft Windows Server 2012 MS Level 2CIS Windows Server 2012 MS L2 v3.0.0Windows
CISC-L2-000170 - The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.DISA STIG Cisco IOS Switch L2S v3r1Cisco

CONFIGURATION MANAGEMENT

CISC-L2-000170 - The Cisco switch must have IGMP or MLD Snooping configured on all VLANs.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

CONFIGURATION MANAGEMENT

DB2X-00-004600 - DB2 must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operationsDISA STIG IBM DB2 v10.5 LUW v2r1 DatabaseIBM_DB2DB

IDENTIFICATION AND AUTHENTICATION

Display Level 1 attachmentsMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-65-000017 - The ESXi host SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG VMware vSphere ESXi OS 6.5 v2r4Unix

CONFIGURATION MANAGEMENT

GEN005505 - The SSH daemon must be configured to only use FIPS 140-2 approved ciphers.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005507 - SSH daemon must be configured to only use MACs employing FIPS 140-2 approved cryptographic hash algorithmsDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005507 - The SSH daemon must only use message authentication codes (MACs) that employ FIPS 140-2 cryptographic hash algorithms.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005510 - The SSH client must be configured to only use FIPS 140-2 approved ciphers.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

GEN005512 - The SSH client must only use MACs employing FIPS 140-2 approved cryptographic hash algorithmsDISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN005512 - The SSH client must only use message authentication codes (MACs) that employ FIPS 140-2 cryptographic hash algorithms.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - usedDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN006575 - The file integrity tool must use FIPS 140-2 approved cryptographic hashes for validating file contents - usedDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

MD3X-00-000380 - MongoDB must use NIST FIPS 140-2-validated cryptographic modules for cryptographic operations.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

SRG-OS-000158-ESXI5 - The SSH client must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms - MACs with FIPS 140-2 approved cryptoDISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

WBSP-AS-000212 - The WebSphere Application Server Java 2 security must not be bypassed.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WPAW-00-002200 - The Windows PAW must be configured so that all outbound connections to the Internet from a PAW are blocked.DISA MS Windows Privileged Access Workstation v3r1Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION