Item Search

NameAudit NamePluginCategory
1.2 Install TCP Wrappers - Allow localhost. Note: Replace 172.16.100.0/255.255.255.0 with a network block in use at your organization.CIS Solaris 9 v1.3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

1.2 Install TCP Wrappers - Deny access to this server from all networksCIS Solaris 9 v1.3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Configure TCP Wrappers - Allow localhost.CIS Solaris 10 L1 v5.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Configure TCP Wrappers - Deny access to this server from all networksCIS Solaris 10 L1 v5.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.10.2 - TCP Wrappers - creating a hosts.deny file - configuration - 'hosts.deny file contains ALL:ALL'CIS AIX 5.3/6.1 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.10.3 - TCP Wrappers - creating a hosts.allow file - configuration - 'hosts.allow has been configured'CIS AIX 5.3/6.1 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Configure TCP Wrappers - hosts.allowCIS Solaris 11.1 L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Configure TCP Wrappers - hosts.denyCIS Solaris 11.1 L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.11 Configure TCP Wrappers - hosts.denyCIS Solaris 11.2 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.12 Configure TCP Wrappers - hosts.allowCIS Solaris 11 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.12 Configure TCP Wrappers - hosts.denyCIS Solaris 11 L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2 Ensure /etc/hosts.allow is configuredCIS SUSE Linux Enterprise Server 12 L1 v2.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2 Ensure /etc/hosts.allow is configuredCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2 Ensure /etc/hosts.allow is configuredCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2 Ensure /etc/hosts.allow is configuredCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3 Ensure /etc/hosts.deny is configuredCIS SUSE Linux Enterprise Workstation 12 L1 v2.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3 Ensure /etc/hosts.deny is configuredCIS SUSE Linux Enterprise Server 12 L1 v2.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3 Ensure /etc/hosts.deny is configuredCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3 Ensure /etc/hosts.deny is configuredCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.3.1 Ensure IPv6 default deny firewall policyCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.3.1 Ensure IPv6 default deny firewall policyCIS Oracle Linux 7 Server L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.2.6 Ensure 'Default Window Management permissions setting' Is 'Enabled' to 'Deny Permission'CIS Google Chrome L2 v3.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.5.2 Create /etc/hosts.allow 'ALL:aaa.bbb.ccc.ddd/www.xxx.yyy.zzzCIS Red Hat Enterprise Linux 5 L1 v2.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

4.5.4 Create /etc/hosts.denyCIS Red Hat Enterprise Linux 5 L1 v2.2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4.2 Create /etc/hosts.allowCIS Debian Linux 7 L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4.2 Create /etc/hosts.allowCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4.4 Create /etc/hosts.denyCIS Debian Linux 7 L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

7.4.4 Create /etc/hosts.denyCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Firewall - Deny by Default ACLTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Firewall Filter - Ensure the last term, default-deny, includes the syslog optionJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

Firewall Filter - Protect the Routing Engine using a default deny firewall filterJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

Management Services Security - Allow SNMP queries and/or send traps to more than one trusted server - client-list restrictJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

Management Services Security - Allow SNMP queries and/or send traps to more than one trusted server - clients restrictJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

PCI 1.2 Build firewall and router configurations that restrict connections between untrusted networksPCI DSS 2.0/3.0 - Red Hat LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

PCI 1.2 Firewall/router configuration restrict connections between untrusted networks and cardholder data environment. - TCP WrappersPCI DSS 2.0/3.0 - Solaris 10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PCI 1.2.1/1.3/1.3.2 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environmentPCI DSS 2.0/3.0 - Red Hat LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

PCI 1.2.1/1.3/1.3.2 Restrict inbound and outbound traffic to that which is necessary for the cardholder data environment. - /etc/hosts.allowPCI DSS 2.0/3.0 - Solaris 10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PCI 7.2.3 - Default 'deny-all' setting - '/etc/hosts.deny file contains ALL:ALL'PCI DSS 2.0/3.0 - AIXUnix

SYSTEM AND COMMUNICATIONS PROTECTION

PCI 7.2.3 - Default 'deny-all' setting - 'hosts.allow contains %VALUE%'PCI DSS 2.0/3.0 - AIXUnix

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:DMZ to Trust - Any Any Any PoliciesTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:DMZ to Untrust - Any Any Any PoliciesTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust to DMZ - Any Any Any PoliciesTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Trust to Untrust - Any Any Any PoliciesTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Untrust to DMZ- Any Any Any PoliciesTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Untrust to Trust- Any Any Any PoliciesTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

ScreenOS:Untrust Zone - Block Intrazone TrafficTNS Juniper ScreenOS Best Practices AuditJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

The hosts.allow file limits access to the local networkTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

The hosts.deny file blocks access by defaultTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - The hosts.allow file limits access to the local networkTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - The hosts.deny file blocks access by defaultTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION