Item Search

NameAudit NamePluginCategory
2.1 Ensure that Azure Defender is set to On for ServersCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.2 Ensure that Azure Defender is set to On for App ServiceCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.3 Ensure that Azure Defender is set to On for Azure SQL database serversCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.4 Ensure that Azure Defender is set to On for SQL servers on machinesCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.5 Ensure that Azure Defender is set to On for StorageCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.6 Ensure that Azure Defender is set to On for KubernetesCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.7 Ensure that Azure Defender is set to On for Container RegistriesCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.8 Ensure that Azure Defender is set to On for Key VaultCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.9 Ensure that Windows Defender ATP (WDATP) integration with Security Center is selectedCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.10 Ensure that Microsoft Cloud App Security (MCAS) integration with Security Center is selectedCIS Microsoft Azure Foundations v1.3.1 L2microsoft_azure
2.12 Automatic Actions for Optical MediaCIS Apple macOS 11 v1.2.0 L1Unix
2.12 Automatic Actions for Optical MediaCIS Apple macOS 10.14 v1.4.0 L1Unix
2.12 Automatic Actions for Optical MediaCIS Apple macOS 10.15 v1.3.0 L1Unix
2.12 Automatic Actions for Optical MediaCIS Apple macOS 10.15 v1.4.0 L1Unix
2.12 Automatic Actions for Optical MediaCIS Apple macOS 10.14 v1.3.0 L1Unix
5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
5.2 Ensure a WildFire Analysis profile is enabled for all security policiesCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
5.2 Ensure forwarding is enabled for all applications and file types in WildFire file blocking profilesCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
5.2 Ensure forwarding is enabled for all applications and file types in WildFire file blocking profilesCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
5.3 Ensure a WildFire Analysis profile is enabled for all security policiesCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
5.3 Ensure a WildFire Analysis profile is enabled for all security policiesCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.1 Ensure that antivirus profiles are set to block on all decoders except 'imap' and 'pop3'CIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.1 Ensure that antivirus profiles are set to block on all decoders except 'imap' and 'pop3'CIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
6.1 Ensure that antivirus profiles are set to reset-both on all decoders except 'imap' and 'pop3'CIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.3 Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threatsCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
6.3 Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threatsCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.3 Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threatsCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
6.5 Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the InternetCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto
6.6 Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the InternetCIS Palo Alto Firewall 9 v1.0.1 L1Palo_Alto
6.6 Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the InternetCIS Palo Alto Firewall 10 v1.0.0 L1Palo_Alto
18.9.45.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 2004) v1.9.1 L1 + BLWindows
18.9.45.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 2004) v1.9.1 L1 + BL + NGWindows
18.9.45.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 2004) v1.9.1 L1 + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1809) v1.6.1 L1Windows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1903) v1.7.1 L1 + BLWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1809) v1.6.1 L1 + BL + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1809) v1.6.1 L1 + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1903) v1.7.1 L1Windows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1909) v1.8.1 L1Windows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1903) v1.7.1 L1 + BL + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1909) v1.8.1 L1 + BL + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1903) v1.7.1 L1 + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1909) v1.8.1 L1 + BLWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1909) v1.8.1 L1 + NGWindows
18.9.77.14 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows 10 Enterprise (Release 1809) v1.6.1 L1 + BLWindows