Item Search

NameAudit NamePluginCategory
2.2.4 Ensure 'Act as part of the operating system' is set to 'No One'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.7 Ensure 'Allow log on locally' is set to 'Administrators'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.10 Ensure 'Back up files and directories' is set to 'Administrators'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.11 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.12 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.13 Ensure 'Create a pagefile' is set to 'Administrators'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.14 Ensure 'Create a token object' is set to 'No One'CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.14 Ensure 'Create a token object' is set to 'No One'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.14 Ensure 'Create a token object' is set to 'No One'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.15 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.22 Ensure 'Deny log on as a service' to include 'Guests'CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.22 Ensure 'Deny log on as a service' to include 'Guests'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.24 Ensure 'Deny log on locally' to include 'Guests'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.25 Ensure 'Deny log on through Remote Desktop Services' is set to 'Guests, Local account' (MS only)CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.33 Ensure 'Increase scheduling priority' is set to 'Administrators'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.35 Ensure 'Lock pages in memory' is set to 'No One'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.39 Ensure 'Modify an object label' is set to 'No One'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.41 Ensure 'Perform volume maintenance tasks' is set to 'Administrators'CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.43 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.44 Ensure 'Replace a process level token' is set to 'LOCAL SERVICE, NETWORK SERVICE'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.45 Ensure 'Restore files and directories' is set to 'Administrators'CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.2.46 Ensure 'Shut down the system' is set to 'Administrators'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows 11 Enterprise v3.0.0 L1Windows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths' is configuredCIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BLWindows

ACCESS CONTROL

2.3.10.8 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

3.1 Ensure that role-based access control is enabled and configured appropriatelyCIS MongoDB Database Audit L1 v1.0.0MongoDB

ACCESS CONTROL

3.3.1 Establish DAS administrative groupCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

ACCESS CONTROL

3.3.1 Establish DAS administrative group - 'dasadm_group name'CIS IBM DB2 OS L1 v1.2.0Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Groups listCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL

4.3 Review Users, Groups, and Roles - Users listCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

ACCESS CONTROL

4.20 init.ora - 'audit_sys_operations= TRUE'CIS Oracle 9 10 Windows Level2 v2.01Windows

ACCESS CONTROL

4.20 init.ora - audit_sys_operations=TRUECIS Oracle 9/10 OS Audit L2 v2.01Unix

ACCESS CONTROL

5.1.2 Check System Wide Applications for appropriate permissionsCIS Apple macOS 10.12 L1 v1.1.0Unix

ACCESS CONTROL

5.1.2 Check System Wide Applications for appropriate permissionsCIS Apple macOS 10.13 L1 v1.0.0Unix

ACCESS CONTROL

5.2.4 Ensure SSH access is limitedCIS Oracle Linux 7 Workstation L1 v3.0.0Unix

ACCESS CONTROL

5.2.4 Ensure SSH access is limitedCIS Oracle Linux 7 Server L1 v3.0.0Unix

ACCESS CONTROL

6.2.13 Limit Access via SSH 'AllowUsers/Groups, DenyUsers/Groups'CIS Red Hat Enterprise Linux 5 L1 v2.2Unix

ACCESS CONTROL

12.04 Oracle DBA group membership on host - 'Review'CIS v1.1.0 Oracle 11g OS L1Unix

ACCESS CONTROL

12.04 Oracle DBA group membership on host - 'Review'CIS Oracle 9/10 OS Audit L1 v2.01Unix

ACCESS CONTROL

12.04 Oracle DBA group membership on host - 'Review'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows

ACCESS CONTROL

BSI-100-2: S 4.432: Secure configuration of server applications: Bypass traverse checking (Everyone)BSI-100-2 Windows 2005Windows

ACCESS CONTROL

BSI-100-2: S 4.432: Secure configuration of server applications: Remove computer from docking station (Administrators)BSI-100-2 Windows 2005Windows

ACCESS CONTROL

User Accounts - 'User Accounts should be reviewed'TNS Check Point GAiA Best PracticesCheckPoint

ACCESS CONTROL