Item Search

NameAudit NamePluginCategory
1.4.5 Ensure version 7.2 or newer booted with a BIOS have a unique name for the grub superusers accountCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.480 - systems prior to version 7.2 with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - passwordTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.480 - systems prior to version 7.2 with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - superusersTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.481 - The system must require authentication upon booting into single-user and maintenance modes.Tenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.482 - systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - passwordTenable Fedora Linux Best Practices v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

1.482 - systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes - superusersTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.490 - systems prior to version 7.2 using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes - passwordTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.490 - systems prior to version 7.2 using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes - superusersTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.491 - systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes - passwordTenable Fedora Linux Best Practices v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

1.491 - systems version 7.2 or newer using Unified Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user and maintenance modes - superusersTenable Fedora Linux Best Practices v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.027 - Non-administrative user accounts or groups will only have print permissions of Printer Shares.DISA Windows Server 2008 R2 DC STIG v1r34Windows
3.027 - Non-administrative user accounts or groups will only have print permissions of Printer Shares.DISA Windows Server 2008 R2 MS STIG v1r33Windows
3.027 - Printer share permissions are not configured as recommended.DISA Windows Server 2008 DC STIG v6r47Windows
3.027 - Printer share permissions are not configured as recommended.DISA Windows Server 2008 MS STIG v6r46Windows
3.027 - Printer share permissions must be restricted to Print for non administrators.DISA Windows 7 STIG v1r32Windows
Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

ACCESS CONTROL

Big Sur - Enforce Approved Authorization for Logical AccessNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-171Unix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Catalina - Enforce Approved Authorization for Logical AccessNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

ACCESS CONTROL

DTAM144 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent termination of McAfee processes.DISA McAfee VirusScan 8.8 Local Client STIG v5r15Windows
DTAM144 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent termination of McAfee processes.DISA McAfee VirusScan 8.8 Local Client STIG v5r16Windows
GEN000020 - The system must require authentication upon booting into single-user and maintenance modes.DISA STIG AIX 6.1 v1r13Unix
GEN008620 - BIOS or system controllers supporting password protection must have administrator accounts/passwords configured and no others.DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix
GEN008620 - System BIOS or system controllers must have administrator accounts/passwords configured, and no othersDISA STIG HP-UX 11.31 v1r19Unix
GEN008620 - System BIOS or system controllers supporting password protection must have administrator accounts/passwords configured, and no others.DISA STIG for Oracle Linux 5 v1r14Unix
GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.DISA STIG for Oracle Linux 5 v1r14Unix
GEN008710 - The system boot loader must protect passwords using an MD5 or stronger cryptographic hash.DISA STIG for Red Hat Enterprise Linux 5 v1r17 AuditUnix
Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL

Monterey - Enforce Approved Authorization for Logical AccessNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL