Name | Audit Name | Plugin | Category |
---|---|---|---|
5.2.15 Ensure only strong Key Exchange algorithms are used - approved algorithms | CIS Red Hat EL7 Workstation L1 v3.0.1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.2.15 Ensure only strong Key Exchange algorithms are used - weak algorithms | CIS Red Hat EL7 Workstation L1 v3.0.1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |