Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 1 of 73
• 3645 Total
Next
Next ››
Name
Audit Name
Plugin
Category
2.1 Secure DB2 Runtime Library
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
2.1 Secure DB2 Runtime Library
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
2.1 Secure the DB2 Runtime Library
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
2.2 Secure the database container directory
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
2.2 Secure the database container directory
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/cores
CIS Solaris 11 L1 v1.1.0
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/share/cores
CIS Solaris 11.1 L1 v1.0.0
Unix
3.1.5 Secure permissions for default database file path
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
3.1.5 Secure permissions for default database file path (Scored)
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.7 Secure permissions for all diagnostic logs
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1.7 Secure permissions for all diagnostic logs
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
3.1.7 Secure permissions for all diagnostic logs
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.9 Require instance name for discovery requests
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.12 Enable instance health monitoring
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.12 Enable instance health monitoring
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.13 Retain fenced model processes
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS Permissions
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.2 Restrict Core Dumps to Protected Directory - Check if permissions for /var/cores are OK.
CIS Solaris 10 L1 v5.2
Unix
3.2.1 TCP/IP service name - svcename
CIS IBM DB2 v10 v1.1.0 Database Level 2
IBM_DB2DB
3.3.6 Secure the JDK 64-bit runtime library - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows
Windows
3.4 Control access to audit records - /etc/security/audit_control
CIS Apple macOS 10.12 L1 v1.2.0
Unix
3.5 Control access to audit records - /etc/security/audit_control
CIS Apple macOS 10.13 L1 v1.1.0
Unix
4.5 Enable Login Records - Check if permissions for /var/adm/loginlog are OK.
CIS Solaris 10 L1 v5.2
Unix
4.8 Enable System Accounting - Check for files in /var/adm/sa
CIS Solaris 10 L1 v5.2
Unix
8.7 Secure the permissions of the IBMLDAPSecurity.ini file
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
8.7 Secure the permissions of the IBMLDAPSecurity.ini file
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
9.6 Secure the permission of the IBMLDAPSecurity.ini file
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.6 Secure the permission of the IBMLDAPSecurity.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
9.9 Secure plug-in library locations - client
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.9 Secure plug-in library locations - server
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
11.3 Samba: Set Group Ownership of smb.conf File
CIS Solaris 10 L2 v5.2
Unix
11.4 Samba: Set Secure Permissions on smbpasswd File
CIS Solaris 10 L2 v5.2
Unix
11.5 Samba: Set Group Ownership of smbpasswd File
CIS Solaris 10 L2 v5.2
Unix
11.6 Samba: Set Secure smb.conf File Options - owner
CIS Solaris 10 L2 v5.2
Unix
11.8 sendmail: Set Secure Permissions on Log File
CIS Solaris 10 L2 v5.2
Unix
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice
Windows
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice
Unix
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice
Unix
XenServer - All network interfaces are operating in full-duplex mode
TNS Citrix XenServer
Unix
XenServer - Host is enabled
TNS Citrix XenServer
Unix
XenServer - Use a static IP on the management network interface
TNS Citrix XenServer
Unix
‹‹ Previous
Previous
Page 1 of 73
• 3645 Total
Next
Next ››