Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
References
CCI
CCI-001762
CCI
CCI|CCI-001762
Title
Disable or remove organization-defined functions, ports, protocols, software, and services within the system deemed to be unnecessary and/or nonsecure.
Reference Item Details
Reference:
CCI - DISA Control Correlation Identifier
Category:
2024
Audit Items
View all Reference Audit Items
Name
Plugin
Audit Name
APPNET0075 - Disable TLS RC4 cipher in .Net
Windows
DISA STIG for Microsoft Dot Net Framework 4.0 v2r4
AS24-U1-000780 - The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1 Middleware
AS24-U1-000780 - The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
Unix
DISA STIG Apache Server 2.4 Unix Server v3r1
AS24-W2-000780 - The Apache web server must prohibit or restrict the use of nonsecure or unnecessary ports, protocols, modules, and/or services.
Windows
DISA STIG Apache Server 2.4 Windows Site v2r1
CD12-00-004150 - PostgreSQL must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
Unix
DISA STIG Crunchy Data PostgreSQL OS v3r1
DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance
Unix
DISA STIG IBM DB2 v10.5 LUW v2r1 OS Linux
DB2X-00-008300 - DB2 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance
Windows
DISA STIG IBM DB2 v10.5 LUW v2r1 OS Windows
DKER-EE-001050 - TCP socket binding for all Docker Engine - Enterprise nodes in a Universal Control Plane (UCP) cluster must be disabled.
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
DKER-EE-003560 - Docker Enterprise network ports on all running containers must be limited to what is needed.
Unix
DISA STIG Docker Enterprise 2.x Linux/Unix v2r2
DTBC-0074 - Use of the QUIC protocol must be disabled.
Windows
DISA STIG Google Chrome v2r9
EP11-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
Windows
EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4
EPAS-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
Unix
EnterpriseDB PostgreSQL Advanced Server OS Linux v2r1
EX13-CA-000130 - Exchange services must be documented and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2013 Client Access Server STIG v2r2
EX13-EG-000305 - Exchange services must be documented and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6
EX13-MB-000300 - Exchange services must be documented and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3
EX16-ED-000610 - Exchange services must be documented and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5
EX16-MB-000600 - Exchange services must be documented and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6
EX19-ED-000199 Exchange services must be documented, and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2019 Edge Server STIG v2r1
EX19-MB-000198 Exchange services must be documented, and unnecessary services must be removed or disabled.
Windows
DISA Microsoft Exchange 2019 Mailbox Server STIG v2r1
IIST-SI-000239 - The IIS 10.0 websites must use ports, protocols, and services according to Ports, Protocols, and Services Management (PPSM) guidelines.
Windows
DISA IIS 10.0 Site v2r9
IIST-SV-000148 - The IIS 10.0 web server must not be running on a system providing any other role.
Windows
DISA IIS 10.0 Server v3r1
IIST-SV-000148 - The IIS 10.0 web server must not be running on a system providing any other role.
Windows
DISA IIS 10.0 Server v2r10
IIST-SV-000149 - The Internet Printing Protocol (IPP) must be disabled on the IIS 10.0 web server
Windows
DISA IIS 10.0 Server v2r10
IIST-SV-000149 - The Internet Printing Protocol (IPP) must be disabled on the IIS 10.0 web server - IPP must be disabled on the IIS 10.0 web server
Windows
DISA IIS 10.0 Server v3r1
IISW-SI-000239 - The IIS 8.5 websites must utilize ports, protocols, and services according to PPSM guidelines.
Windows
DISA IIS 8.5 Site v2r9
IISW-SV-000148 - The IIS 8.5 web server must not be running on a system providing any other role.
Windows
DISA IIS 8.5 Server v2r7
IISW-SV-000149 - The Internet Printing Protocol (IPP) must be disabled on the IIS 8.5 web server - IPP must be disabled on the IIS 8.5 web server
Windows
DISA IIS 8.5 Server v2r7
MADB-10-008100 - MariaDB must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
MySQLDB
DISA MariaDB Enterprise 10.x v2r1 DB
MYS8-00-009000 - The MySQL Database Server 8.0 must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
MySQLDB
DISA Oracle MySQL 8.0 v2r1 DB
PGS9-00-000100 - PostgreSQL must be configured to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.
PostgreSQLDB
DISA STIG PostgreSQL 9.x on RHEL DB v2r5
PPS9-00-008700 - The EDB Postgres Advanced Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
Unix
EDB PostgreSQL Advanced Server OS Linux Audit v2r3
SQL4-00-034200 - SQL Server must disable communication protocols not required for operation.
Windows
DISA STIG SQL Server 2014 Instance OS Audit v2r4
SQL6-D0-011900 - SQL Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.
MS_SQLDB
DISA STIG SQL Server 2016 Instance DB Audit v3r1
VCEM-67-000029 - ESX Agent Manager must be configured with the appropriate ports.
Unix
DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4
VCEM-70-000031 - ESX Agent Manager must be configured with the appropriate ports.
Unix
DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2
VCFL-67-000028 - vSphere Client must be configured with the appropriate ports.
Unix
DISA STIG VMware vSphere 6.7 Virgo Client v1r2
VCLU-70-000029 - Lookup Service must be configured with the appropriate ports.
Unix
DISA STIG VMware vSphere 7.0 Lookup Service v1r2
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - http
Unix
DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3
VCPF-67-000028 - Performance Charts must be configured with the appropriate ports - https
Unix
DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3
VCPF-70-000031 - Performance Charts must be configured with the appropriate ports.
Unix
DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1
VCPG-70-000008 - VMware Postgres must be configured to use the correct port.
Unix
DISA STIG VMware vSphere 7.0 PostgreSQL v1r2
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - http
Unix
DISA STIG VMware vSphere 6.7 STS Tomcat v1r3
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - https
Unix
DISA STIG VMware vSphere 6.7 STS Tomcat v1r3
VCST-67-000028 - The Security Token Service must be configured with the appropriate ports - localhost.https
Unix
DISA STIG VMware vSphere 6.7 STS Tomcat v1r3
VCST-70-000028 - The Security Token Service must be configured with the appropriate ports. - ssl-clientauth.https
Unix
DISA STIG VMware vSphere 7.0 STS Tomcat v1r2
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - http
Unix
DISA STIG VMware vSphere 6.7 UI Tomcat v1r3
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - https
Unix
DISA STIG VMware vSphere 6.7 UI Tomcat v1r3
VCUI-67-000028 - vSphere UI must be configured with the appropriate ports - proxy
Unix
DISA STIG VMware vSphere 6.7 UI Tomcat v1r3
VCUI-70-000030 - vSphere UI must be configured with the appropriate ports.
Unix
DISA STIG VMware vSphere 7.0 vCA UI v1r2