2.4 Configure TCP Wrappers - Deny access to this server from all networks | CIS Solaris 10 L1 v5.2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.4 Configure TCP Wrappers - Make sure that /etc/hosts.allow does exist. | CIS Solaris 10 L1 v5.2 | Unix | CONFIGURATION MANAGEMENT |
3.3 Enable Stack Protection - Makes sure 'noexec_user_stack' is set to 1 in /etc/system. Note: Only applicable if NX bit is set. | CIS Solaris 10 L1 v5.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.3 Enable Auditing of File Metadata Modification Events | CIS Oracle Solaris 11.4 L1 v1.1.0 | Unix | AUDIT AND ACCOUNTABILITY |
4.4 Defend against Denial of Service Attacks | CIS ISC BIND 9.0/9.5 v2.0.0 | Unix | |
4.9 Enable Kernel Level Auditing - Check audit policies is set to arge,argv,cnt | CIS Solaris 10 L1 v5.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.9 Enable Kernel Level Auditing, Check if 'flags:lo,ad,cc' is set in /etc/security/audit_control. | CIS Solaris 10 L1 v5.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.9 Enable Kernel Level Auditing, Check if 'minfree:20' is set in /etc/security/audit_control. | CIS Solaris 10 L1 v5.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.9 Enable Kernel Level Auditing, Check if 'naflags:lo,ad,ex' is set in /etc/security/audit_control. | CIS Solaris 10 L1 v5.2 | Unix | AUDIT AND ACCOUNTABILITY |
4.9 Enable Kernel Level Auditing, Check if 'root:lo,ad:no' is set in /etc/security/audit_user. | CIS Solaris 10 L1 v5.2 | Unix | AUDIT AND ACCOUNTABILITY |
6.1.1 Configure SSH - Check if Host * is set in /etc/ssh/ssh_config. | CIS Solaris 10 L1 v5.2 | Unix | CONFIGURATION MANAGEMENT |
6.9 Harden host operating system | CIS Sybase 15.0 L1 DB v1.1.0 | SybaseDB | |
7.3 Set Strong Password Creation Policies - Check DICTIONLIST is set to /usr/share/lib/dict/words | CIS Solaris 10 L1 v5.2 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.3 Set Strong Password Creation Policies - Check MINUPPER is set to 1 | CIS Solaris 10 L1 v5.2 | Unix | IDENTIFICATION AND AUTHENTICATION |
7.6 Set Default umask for Users - Check if 'umask' is set to 077 - Check /etc/profile. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
7.6 Set Default umask for Users, Check if 'UMASK' is set to 077. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
8.2 Create Warning Banner for CDE Users - Check if 'Dtlogin*greeting.labelString' is set appropriately. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
ARDC-CL-000045 - Adobe Reader DC must block Flash Content. | DISA STIG Adobe Acrobat Reader DC Classic Track v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000005 - Adobe Reader DC must enable Enhanced Security in a Standalone Application. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000030 - Adobe Reader DC must block access to Unknown Websites. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000035 - Adobe Reader DC must prevent opening files other than PDF or FDF. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000045 - Adobe Reader DC must block Flash Content. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
ARDC-CN-000050 - Adobe Reader DC must disable the ability to change the Default Handler. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | CONFIGURATION MANAGEMENT |
ARDC-CN-000080 - Adobe Reader DC must disable Acrobat Upsell. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | CONFIGURATION MANAGEMENT |
ARDC-CN-000315 - Adobe Reader DC must disable the ability to add Trusted Files and Folders. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | CONFIGURATION MANAGEMENT |
ARDC-CN-000320 - Adobe Reader DC must disable the ability to elevate IE Trusts to Privileged Locations. | DISA STIG Adobe Acrobat Reader DC Continuous Track v2r1 | Windows | CONFIGURATION MANAGEMENT |
CIS_Azure_Compute_Microsoft_Windows_Server_2019_v1.0.0_NG_DC.audit from CIS Azure Compute Microsoft Windows Server 2019 Benchmark v1.0.0 | CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 NG DC | Windows | |
CIS_Microsoft_Intune_for_Windows_10_v3.0.1_L1.audit from CIS Microsoft Intune for Windows 10 Benchmark v3.0.1 | CIS Microsoft Intune for Windows 10 v3.0.1 L1 | Windows | |
CIS_Microsoft_Intune_for_Windows_11_v3.0.1_L1.audit from CIS Microsoft Intune for Windows 11 Benchmark v3.0.1 | CIS Microsoft Intune for Windows 11 v3.0.1 L1 | Windows | |
CIS_Microsoft_Intune_for_Windows_11_v3.0.1_L2.audit from CIS Microsoft Intune for Windows 11 Benchmark v3.0.1 | CIS Microsoft Intune for Windows 11 v3.0.1 L2 | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_BL.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 BL | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_L1_BL_NG.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NG | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_L1.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_L2_BL.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL | Windows | |
CIS_Microsoft_Windows_10_Stand-alone_v3.0.0_L2.audit from CIS Microsoft Windows 10 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 | Windows | |
CIS_Microsoft_Windows_11_Stand-alone_v3.0.0_BL.audit from CIS Microsoft Windows 11 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 11 Stand-alone v3.0.0 BL | Windows | |
CIS_Microsoft_Windows_11_Stand-alone_v3.0.0_L1.audit from CIS Microsoft Windows 11 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 | Windows | |
CIS_Microsoft_Windows_11_Stand-alone_v3.0.0_L2.audit from CIS Microsoft Windows 11 Stand-alone Benchmark v3.0.0 | CIS Microsoft Windows 11 Stand-alone v3.0.0 L2 | Windows | |
CIS_Microsoft_Windows_Server_2019_Stand-alone_v2.0.0_L1_MS.audit from CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 | CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MS | Windows | |
CIS_MS_Windows_Server_2008_R2_MS_Level_1_v3.3.1.audit from CIS MS Windows Server 2008 R2 Benchmark v3.3.1 | CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1 | Windows | |
CIS_MS_Windows_Server_2008_R2_MS_Level_2_v3.3.1.audit from CIS MS Windows Server 2008 R2 Benchmark v3.3.1 | CIS Microsoft Windows Server 2008 R2 Member Server Level 2 v3.3.1 | Windows | |
CIS_MS_Windows_Server_2008_v3.3.1_L2_MS.audit from CIS MS Windows Server 2008 non-R2 Benchmark v3.3.1 | CIS Microsoft Windows Server 2008 Member Server Level 2 v3.3.1 | Windows | |
Encryption type for password protected Office 97-2003 files | MSCT M365 Apps for enterprise 2312 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Encryption type for password protected Office 97-2003 files | MSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Encryption type for password protected Office 97-2003 files | Microsoft 365 Apps for Enterprise 2306 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Encryption type for password protected Office 97-2003 files | MSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
PowerPoint 97-2003 presentations, shows, templates and add-in files | MSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
PowerPoint 97-2003 presentations, shows, templates and add-in files | Microsoft 365 Apps for Enterprise 2306 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
PowerPoint 97-2003 presentations, shows, templates and add-in files | MSCT M365 Apps for enterprise 2312 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
TCAT-AS-000690 - LDAP authentication must be secured. | DISA STIG Apache Tomcat Application Server 9 v3r1 Middleware | Unix | IDENTIFICATION AND AUTHENTICATION |