Item Search

NameAudit NamePluginCategory
1.7.11 Ensure Xwayland is configuredCIS Ubuntu Linux 22.04 LTS v3.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.6 Ensure Xwayland is configuredCIS Rocky Linux 10 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.8.6 Ensure Xwayland is configuredCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.8.6 Ensure Xwayland is configuredCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.6 Ensure Xwayland is configuredCIS Red Hat Enterprise Linux 10 v1.0.1 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.6 Ensure Xwayland is configuredCIS Rocky Linux 10 v1.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.6 Ensure Xwayland is configuredCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.8.7 Ensure Xwayland is configuredCIS Rocky Linux 8 v3.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.7 Ensure Xwayland is configuredCIS AlmaLinux OS 8 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.8.7 Ensure Xwayland is configuredCIS AlmaLinux OS 8 v4.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT

1.8.7 Ensure Xwayland is configuredCIS Oracle Linux 8 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

1.43 RHEL-09-214010CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure time set is within appropriate limitsCIS Apple OSX 10.9 L1 v1.3.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X Window System is not installedCIS Amazon Linux v2.1.0 L1Unix

CONFIGURATION MANAGEMENT

4.2.4 Enable AI /heuristic based malware detectionCIS Fortigate 7.0.x v1.4.0 L2FortiGate

SYSTEM AND INFORMATION INTEGRITY

4.2.4 Enable AI /heuristic based malware detectionCIS FortiGate 7.4.x v1.0.1 L2FortiGate

SYSTEM AND INFORMATION INTEGRITY

4.5.3 Ensure password reuse is limitedCIS Amazon Linux 2023 v1.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.5.3 Ensure password reuse is limitedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 8 L2 v1.1.0 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

89.7 (L1) Ensure 'Create Global Objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

DTAVSEL-002 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to receive automatic updates.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTOO139 - The Save commands default file format must be configured.DISA STIG Microsoft Word 2016 v2r1Windows

CONFIGURATION MANAGEMENT

ESXi : config-firewall-access - 'HBR allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'httpClient blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'IKED blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'SSH Client blocked'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-firewall-access - 'vSphere Client allowed'VMWare vSphere 5.X Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi : config-snmp - 'snmp.receiver.X.enabled'VMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

ESXi : limit-cim-accessVMWare vSphere 5.X Hardening GuideVMware
ESXi : mask-zone-sanVMWare vSphere 5.X Hardening GuideVMware
ESXi : remove-authorized-keysVMWare vSphere 5.X Hardening GuideVMware
ESXi : verify-config-filesVMWare vSphere 5.X Hardening GuideVMware
Fortigate - Inactivity timeout - 'console' <= 300TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

JBOS-AS-000735 - JBoss servers must be configured to roll over and transfer logs on a minimum weekly basis.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

MD4X-00-006600 - MongoDB must be configured in accordance with the security configuration settings based on DoD security configuration and implementation guidance, including STIGs, NSA configuration guides, CTOs, DTMs, and IAVMs.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

CONFIGURATION MANAGEMENT

SLEM-05-272010 - SLEM 5 must not allow unattended or automatic logon via the graphical user interface (GUI).DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

CONFIGURATION MANAGEMENT

SLEM-05-654095 - SLEM 5 must generate audit records for all uses of the "ssh-agent" command.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SLEM-05-654100 - SLEM 5 must generate audit records for all uses of the "ssh-keysign" command.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

SSO : config-ntpVMWare vSphere 5.X Hardening GuideVMware
User Authentication Security - Configure login security options to hinder password guessing attacks - backoff-factorJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL

vCenter : check-privilege-reassignmentVMWare vSphere 5.X Hardening GuideVMware
vCenter : restrict-admin-roleVMWare vSphere 5.X Hardening GuideVMware
vCenter : restrict-certificate-accessVMWare vSphere 5.X Hardening GuideVMware
vCenter : restrict-vcs-db-userVMWare vSphere 5.X Hardening GuideVMware
vCenter : secure-vco-file-accessVMWare vSphere 5.X Hardening GuideVMware
vCenter : verify-client-pluginsVMWare vSphere 5.X Hardening GuideVMware
VUM : isolate-vum-airgapVMWare vSphere 5.X Hardening GuideVMware
VUM : limit-vum-usersVMWare vSphere 5.X Hardening GuideVMware