| 1.7.11 Ensure Xwayland is configured | CIS Ubuntu Linux 22.04 LTS v3.0.0 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.6 Ensure Xwayland is configured | CIS Rocky Linux 10 v1.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.6 Ensure Xwayland is configured | CIS Oracle Linux 10 v1.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.6 Ensure Xwayland is configured | CIS Oracle Linux 10 v1.0.0 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.6 Ensure Xwayland is configured | CIS Red Hat Enterprise Linux 10 v1.0.1 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.6 Ensure Xwayland is configured | CIS Rocky Linux 10 v1.0.0 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.6 Ensure Xwayland is configured | CIS AlmaLinux OS 10 v1.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.7 Ensure Xwayland is configured | CIS Rocky Linux 8 v3.0.0 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.7 Ensure Xwayland is configured | CIS AlmaLinux OS 8 v4.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.8.7 Ensure Xwayland is configured | CIS AlmaLinux OS 8 v4.0.0 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
| 1.8.7 Ensure Xwayland is configured | CIS Oracle Linux 8 v4.0.0 L2 Server | Unix | CONFIGURATION MANAGEMENT |
| 1.43 RHEL-09-214010 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II | Unix | CONFIGURATION MANAGEMENT |
| 2.2.2 Ensure time set is within appropriate limits | CIS Apple OSX 10.9 L1 v1.3.0 | Unix | CONFIGURATION MANAGEMENT |
| 2.2.2 Ensure X Window System is not installed | CIS Amazon Linux v2.1.0 L1 | Unix | CONFIGURATION MANAGEMENT |
| 4.2.4 Enable AI /heuristic based malware detection | CIS Fortigate 7.0.x v1.4.0 L2 | FortiGate | SYSTEM AND INFORMATION INTEGRITY |
| 4.2.4 Enable AI /heuristic based malware detection | CIS FortiGate 7.4.x v1.0.1 L2 | FortiGate | SYSTEM AND INFORMATION INTEGRITY |
| 4.5.3 Ensure password reuse is limited | CIS Amazon Linux 2023 v1.0.0 L1 Server | Unix | IDENTIFICATION AND AUTHENTICATION |
| 5.5.3 Ensure password reuse is limited | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | IDENTIFICATION AND AUTHENTICATION |
| 6.1 Setup Client-cert Authentication | CIS Apache Tomcat 8 L2 v1.1.0 Middleware | Unix | IDENTIFICATION AND AUTHENTICATION |
| 89.7 (L1) Ensure 'Create Global Objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE' | CIS Microsoft Intune for Windows 11 v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| DTAVSEL-002 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to receive automatic updates. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| DTOO139 - The Save commands default file format must be configured. | DISA STIG Microsoft Word 2016 v2r1 | Windows | CONFIGURATION MANAGEMENT |
| ESXi : config-firewall-access - 'HBR allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
| ESXi : config-firewall-access - 'httpClient blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
| ESXi : config-firewall-access - 'IKED blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
| ESXi : config-firewall-access - 'SSH Client blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
| ESXi : config-firewall-access - 'vSphere Client allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
| ESXi : config-snmp - 'snmp.receiver.X.enabled' | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
| ESXi : limit-cim-access | VMWare vSphere 5.X Hardening Guide | VMware | |
| ESXi : mask-zone-san | VMWare vSphere 5.X Hardening Guide | VMware | |
| ESXi : remove-authorized-keys | VMWare vSphere 5.X Hardening Guide | VMware | |
| ESXi : verify-config-files | VMWare vSphere 5.X Hardening Guide | VMware | |
| Fortigate - Inactivity timeout - 'console' <= 300 | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
| JBOS-AS-000735 - JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis. | DISA JBoss Enterprise Application Platform 6.3 STIG v2r6 | Unix | AUDIT AND ACCOUNTABILITY |
| MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs. | DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OS | Unix | CONFIGURATION MANAGEMENT |
| SLEM-05-272010 - SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI). | DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3 | Unix | CONFIGURATION MANAGEMENT |
| SLEM-05-654095 - SLEM 5 must generate audit records for all uses of the "ssh-agent" command. | DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3 | Unix | AUDIT AND ACCOUNTABILITY, MAINTENANCE |
| SLEM-05-654100 - SLEM 5 must generate audit records for all uses of the "ssh-keysign" command. | DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3 | Unix | AUDIT AND ACCOUNTABILITY, MAINTENANCE |
| SSO : config-ntp | VMWare vSphere 5.X Hardening Guide | VMware | |
| User Authentication Security - Configure login security options to hinder password guessing attacks - backoff-factor | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
| vCenter : check-privilege-reassignment | VMWare vSphere 5.X Hardening Guide | VMware | |
| vCenter : restrict-admin-role | VMWare vSphere 5.X Hardening Guide | VMware | |
| vCenter : restrict-certificate-access | VMWare vSphere 5.X Hardening Guide | VMware | |
| vCenter : restrict-vcs-db-user | VMWare vSphere 5.X Hardening Guide | VMware | |
| vCenter : secure-vco-file-access | VMWare vSphere 5.X Hardening Guide | VMware | |
| vCenter : verify-client-plugins | VMWare vSphere 5.X Hardening Guide | VMware | |
| VUM : isolate-vum-airgap | VMWare vSphere 5.X Hardening Guide | VMware | |
| VUM : limit-vum-users | VMWare vSphere 5.X Hardening Guide | VMware | |