Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
CIS Linux Mint 22 v1.0.0 L1 Workstation
Changelog
Revision 1.1
Changelog
Revision 1.1
Nov 3, 2025
Functional Update
2.1.10 Ensure nis server services are not in use
2.1.13 Ensure rpcbind services are not in use
2.1.18 Ensure web proxy server services are not in use
2.1.20 Ensure xinetd services are not in use
2.1.5 Ensure dnsmasq services are not in use
2.1.6 Ensure ftp server services are not in use
6.1.1.2 Ensure journald log file access is configured
Informational Update
1.1.1.1 Ensure cramfs kernel module is not available
1.1.1.10 Ensure unused filesystems kernel modules are not available
1.1.1.2 Ensure freevxfs kernel module is not available
1.1.1.3 Ensure hfs kernel module is not available
1.1.1.4 Ensure hfsplus kernel module is not available
1.1.1.5 Ensure jffs2 kernel module is not available
1.1.2.1.1 Ensure /tmp is tmpfs or a separate partition
1.1.2.1.2 Ensure nodev option set on /tmp partition
1.1.2.1.3 Ensure nosuid option set on /tmp partition
1.1.2.1.4 Ensure noexec option set on /tmp partition
1.1.2.2.1 Ensure /dev/shm is tmpfs or a separate partition
1.1.2.2.2 Ensure nodev option set on /dev/shm partition
1.1.2.2.3 Ensure nosuid option set on /dev/shm partition
1.1.2.2.4 Ensure noexec option set on /dev/shm partition
1.1.2.3.2 Ensure nodev option set on /home partition
1.1.2.3.3 Ensure nosuid option set on /home partition
1.1.2.4.2 Ensure nodev option set on /var partition
1.1.2.4.3 Ensure nosuid option set on /var partition
1.1.2.5.2 Ensure nodev option set on /var/tmp partition
1.1.2.5.3 Ensure nosuid option set on /var/tmp partition
1.1.2.5.4 Ensure noexec option set on /var/tmp partition
1.1.2.6.2 Ensure nodev option set on /var/log partition
1.1.2.6.3 Ensure nosuid option set on /var/log partition
1.1.2.6.4 Ensure noexec option set on /var/log partition
1.1.2.7.2 Ensure nodev option set on /var/log/audit partition
1.1.2.7.3 Ensure nosuid option set on /var/log/audit partition
1.1.2.7.4 Ensure noexec option set on /var/log/audit partition
1.5.1 Ensure randomize_va_space is configured
1.5.2 Ensure ptrace_scope is configured
1.5.3 Ensure suid_dumpable is configured
1.5.4 Ensure core file size is configured
1.6.1 Ensure /etc/motd is configured
1.6.2 Ensure /etc/issue is configured
1.6.3 Ensure /etc/issue.net is configured
2.1.11 Ensure openssh server services are not in use
2.1.13 Ensure rpcbind services are not in use
2.1.14 Ensure rsync services are not in use
2.1.16 Ensure snmp services are not in use
2.1.17 Ensure tftp server services are not in use
2.1.19 Ensure web server services are not in use
2.1.20 Ensure xinetd services are not in use
2.1.3 Ensure dhcp server services are not in use
2.1.4 Ensure dns server services are not in use
2.1.8 Ensure message access server services are not in use
2.2.2 Ensure rsh client is not installed
2.3.1.1 Ensure a single time synchronization daemon is in use
2.3.2.1 Ensure systemd-timesyncd configured with authorized timeserver
2.4.1.8 Ensure access to /etc/cron.d is configured
2.4.1.9 Ensure access to crontab is configured
2.4.2.1 Ensure access to at is configured
3.2.1 Ensure dccp kernel module is not available
3.2.2 Ensure tipc kernel module is not available
3.2.3 Ensure rds kernel module is not available
3.2.4 Ensure sctp kernel module is not available
3.3.1 Ensure ip forwarding is disabled
3.3.10 Ensure tcp syn cookies is enabled
3.3.11 Ensure ipv6 router advertisements are not accepted
3.3.2 Ensure packet redirect sending is disabled
3.3.3 Ensure bogus icmp responses are ignored
3.3.4 Ensure broadcast icmp requests are ignored
3.3.5 Ensure icmp redirects are not accepted
3.3.6 Ensure secure icmp redirects are not accepted
3.3.7 Ensure reverse path filtering is enabled
3.3.8 Ensure source routed packets are not accepted
3.3.9 Ensure suspicious packets are logged
5.1.1 Ensure sudo is installed
5.1.2 Ensure sudo commands use pty
5.1.3 Ensure sudo log file exists
5.1.7 Ensure access to the su command is restricted
5.2.2.1 Ensure pam_unix module is enabled
5.2.2.2 Ensure pam_faillock module is enabled
5.2.2.4 Ensure pam_pwhistory module is enabled
5.2.3.1.1 Ensure password failed attempts lockout is configured
5.2.3.2.1 Ensure password number of changed characters is configured
5.2.3.2.2 Ensure minimum password length is configured
5.2.3.2.4 Ensure password same consecutive characters is configured
5.2.3.2.5 Ensure password maximum sequential characters is configured
5.2.3.2.6 Ensure password dictionary check is enabled
5.2.3.2.7 Ensure password quality checking is enforced
5.2.3.4.2 Ensure pam_unix does not include remember
5.3.1.4 Ensure strong password hashing algorithm is configured
5.3.2.5 Ensure root path integrity
5.3.2.6 Ensure root user umask is configured
5.3.3.2 Ensure default user shell timeout is configured
5.3.3.3 Ensure default user umask is configured
6.1.1.3 Ensure journald log file rotation is configured
6.1.2.2 Ensure journald ForwardToSyslog is disabled
6.1.2.3 Ensure journald Compress is configured
6.1.2.4 Ensure journald Storage is configured
6.1.3.1 Ensure access to all logfiles has been configured
7.2.1 Ensure accounts in /etc/passwd use shadowed passwords
7.2.10 Ensure local interactive user dot files access is configured
7.2.3 Ensure all groups in /etc/passwd exist in /etc/group
7.2.7 Ensure no duplicate user names exist
7.2.8 Ensure no duplicate group names exist
Miscellaneous
Metadata updated.