Item Search

NameAudit NamePluginCategory
1.2.1 Set 'privilege 1' for local users - 'All users have encrypted passwords'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.2.7 Set 'exec-timeout' to less than or equal to 10 minutes 'line console 0'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.3.1 Set the 'banner-text' for 'banner exec'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.3.2 Set the 'banner-text' for 'banner login'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.4.1 Set 'password' for 'enable secret'CIS Cisco IOS 15 L1 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.4.3 Set 'username secret' for all local usersCIS Cisco IOS 12 L1 v4.0.0Cisco

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.9 Set 'priv' for each 'snmp-server group' using SNMPv3CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

1.7.1 Ensure 'HTTP source restriction' is set to an authorized IP addressTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

2.1.5 Set 'no ip identd'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.6 Set 'service tcp-keepalives-in'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.5 Set 'logging trap informational'CIS Cisco IOS 15 L1 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

2.4.4 Set 'ip tftp source-interface' to the Loopback InterfaceCIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3 Set 'no interface tunnel'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 192.0.2.0'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny host 255.255.255.255'CIS Cisco IOS 12 L2 v4.0.0Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

3.3.1.9 Set 'ip authentication mode eigrp'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.2.1 Set 'authentication message-digest' for OSPF areaCIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.3.3.4 Set 'ip rip authentication key-chain'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

DTOO118 - Excel - Corrupt workbook options must be disallowed.DISA STIG Office 2010 Excel v1r11Windows

CONFIGURATION MANAGEMENT

DTOO215 - Outlook - Read signed email as plain text must be enforced.DISA STIG Office 2010 Outlook v1r13Windows

CONFIGURATION MANAGEMENT

DTOO238 - Outlook - Users customizing attachment security settings must be prevented.DISA STIG Office 2010 Outlook v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO244 - Level 1 file extensions must be blocked and not removed.DISA STIG Microsoft Outlook 2013 v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO244 - Outlook - Level 1 file extensions must be blocked and not removed.DISA STIG Office 2010 Outlook v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO313 - Outlook - Automatically downloading enclosures on RSS must be disallowed.DISA STIG Office 2010 Outlook v1r13Windows

CONFIGURATION MANAGEMENT

DTOO316 - Outlook - Outlook minimum encryption key length settings must be set.DISA STIG Office 2010 Outlook v1r13Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO425 - Text in Outlook that represents internet and network paths must not be automatically turned into hyperlinks.DISA STIG Microsoft Outlook 2016 v2r3Windows

CONFIGURATION MANAGEMENT

JUNI-RT-000660 - The Juniper PE router providing Virtual Private LAN Services (VPLS) must be configured to have all attachment circuits defined to the routing instance with the globally unique VPLS ID assigned for each customer VLAN.DISA STIG Juniper Router RTR v3r1Juniper

CONTINGENCY PLANNING

OL08-00-010542 - OL 8 must use a separate file system for the system audit data path.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-010544 - OL 8 must use a separate file system for /var/tmp.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-020262 - The OL 8 lastlog command must have a mode of '0750' or less permissive.DISA Oracle Linux 8 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-020264 - The OL 8 lastlog command must be group-owned by root.DISA Oracle Linux 8 STIG v2r2Unix

SYSTEM AND INFORMATION INTEGRITY

OL08-00-020331 - OL 8 must not allow blank or null passwords in the system-auth file.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

OL08-00-040300 - The OL 8 file integrity tool must be configured to verify extended attributes.DISA Oracle Linux 8 STIG v2r2Unix

CONFIGURATION MANAGEMENT

WN19-00-000130 - Windows Server 2019 local volumes must use a format that supports NTFS attributes.DISA Windows Server 2019 STIG v3r2Windows

ACCESS CONTROL

WN19-00-000220 - Windows Server 2019 system files must be monitored for unauthorized changes.DISA Windows Server 2019 STIG v3r2Windows

CONFIGURATION MANAGEMENT

WN19-AC-000060 - Windows Server 2019 minimum password age must be configured to at least one day.DISA Windows Server 2019 STIG v3r2Windows

IDENTIFICATION AND AUTHENTICATION

WN19-CC-000350 - Windows Server 2019 Remote Desktop Services must prevent drive redirection.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-CC-000410 - Windows Server 2019 must prevent Indexing of encrypted files.DISA Windows Server 2019 STIG v3r2Windows

CONFIGURATION MANAGEMENT

WN19-DC-000140 - Windows Server 2019 must use separate, NSA-approved (Type 1) cryptography to protect the directory data in transit for directory service implementations at a classified confidentiality level when replication data traverses a network cleared to a lower level than the data.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000030 - Windows Server 2019 built-in administrator account must be renamed.DISA Windows Server 2019 STIG v3r2Windows

CONFIGURATION MANAGEMENT

WN19-SO-000150 - Windows Server 2019 Smart Card removal option must be configured to Force Logoff or Lock Workstation.DISA Windows Server 2019 STIG v3r2Windows

CONFIGURATION MANAGEMENT

WN19-SO-000230 - Windows Server 2019 must not allow anonymous enumeration of shares.DISA Windows Server 2019 STIG v3r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-SO-000280 - Windows Server 2019 must prevent PKU2U authentication using online identities.DISA Windows Server 2019 STIG v3r2Windows

CONFIGURATION MANAGEMENT

WN19-UR-000140 - Windows Server 2019 Increase scheduling priority: user right must only be assigned to the Administrators group.DISA Windows Server 2019 STIG v3r2Windows

ACCESS CONTROL

WN19-UR-000220 - Windows Server 2019 Take ownership of files or other objects user right must only be assigned to the Administrators group.DISA Windows Server 2019 STIG v3r2Windows

ACCESS CONTROL

WN22-00-000100 - Windows Server 2022 must be maintained at a supported servicing level.DISA Windows Server 2022 STIG v2r2Windows

CONFIGURATION MANAGEMENT

WN22-AC-000050 - Windows Server 2022 maximum password age must be configured to 60 days or less.DISA Windows Server 2022 STIG v2r2Windows

IDENTIFICATION AND AUTHENTICATION

WN22-CC-000220 - Windows Server 2022 default AutoRun behavior must be configured to prevent AutoRun commands.DISA Windows Server 2022 STIG v2r2Windows

CONFIGURATION MANAGEMENT

WN22-SO-000150 - Windows Server 2022 Smart Card removal option must be configured to Force Logoff or Lock Workstation.DISA Windows Server 2022 STIG v2r2Windows

CONFIGURATION MANAGEMENT

WN22-SO-000230 - Windows Server 2022 must not allow anonymous enumeration of shares.DISA Windows Server 2022 STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION