Item Search

NameAudit NamePluginCategory
2.1 Ensure monitoring and alerting exist for ACCOUNTADMIN and SECURITYADMIN role grantsCIS Snowflake Foundations v1.0.0 L1Snowflake

AUDIT AND ACCOUNTABILITY

3.1.3.4 Ensure that 'Agentless scanning for machines' component status is set to 'On'CIS Microsoft Azure Foundations v3.0.0 L2microsoft_azure

RISK ASSESSMENT

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 7 v1.1.0 L1 MongoDBWindows

CONFIGURATION MANAGEMENT

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

CONFIGURATION MANAGEMENT

6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

RISK ASSESSMENT

18.9.47.15 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.16 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.16 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.16 Ensure 'Configure detection for potentially unwanted applications' is set to 'Enabled: Block'CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Member ServerWindows

SYSTEM AND INFORMATION INTEGRITY

CIS_Apple_macOS_15.0_Sequoia_Cloud-tailored_v1.0.0_L1.audit from CIS Apple macOS 15.0 Sequoia Cloud-tailored Benchmark v1.0.0CIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L1Unix
CIS_Apple_macOS_15.0_Sequoia_Cloud-tailored_v1.0.0_L2.audit from CIS Apple macOS 15.0 Sequoia Cloud-tailored Benchmark v1.0.0CIS Apple macOS 15.0 Sequoia Cloud-tailored v1.0.0 L2Unix
DTAM054 - McAfee VirusScan On-Demand scan must be configured to find unknown program threats.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM054 - McAfee VirusScan On-Demand scan must be configured to find unknown program threats.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM104 - McAfee VirusScan On-Access Scanner All Processes settings must be configured to find unknown unwanted programs and trojans.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM105 - McAfee VirusScan On-Access Default Processes Policies must be configured to find unknown macro viruses.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM105 - McAfee VirusScan On-Access Scanner All Processes settings must be configured to find unknown macro viruses.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-005 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown program viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-005 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown program viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-102 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to find unknown program viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

FireEye - AAA lockouts delay further attempts for at least 30 secondsTNS FireEyeFireEye

ACCESS CONTROL

FireEye - AAA tries local authentication firstTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - Boot manager password is setTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

FireEye - Custom SNORT rules are enabledTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

FireEye - FENet security content updates are applied automaticallyTNS FireEyeFireEye
FireEye - IPMI password needs to be setTNS FireEyeFireEye
FireEye - IPMI should be connected to a restricted management networkTNS FireEyeFireEye
FireEye - LDAP encryption certificates are verifiedTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - LDAP requires encryptionTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - Local logging level includes all errors and warningsTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - Local logging level is not overridden except by defaultsTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - Management interface is only accessible from specific IP rangesTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - NTP client is synchronizedTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - NTP client uses a custom serverTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - SNMP trap hosts that use community override use a secure community stringTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - SNMP v3 uses SHA instead of MD5TNS FireEyeFireEye

ACCESS CONTROL

FireEye - SSH users are logged out after 15 minutes of inactivity or lessTNS FireEyeFireEye

ACCESS CONTROL

FireEye - System events are emailed to administratorsTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

FireEye - Time zone selectionTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - USB media is not auto-mountedTNS FireEyeFireEye

MEDIA PROTECTION

FireEye - Web interface does not use the system self-signed certificateTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - Web users are logged out after 20 minutes of inactivity or lessTNS FireEyeFireEye

ACCESS CONTROL

FireEye - YARA rules are enabledTNS FireEyeFireEye

SECURITY ASSESSMENT AND AUTHORIZATION

GEN008380 - A root kit check tool must be run on the system at least weekly.DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000011 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent code injection attacks launched against data storage objects, including, at a minimum, databases, database records, queries, and fields.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

JUSX-IP-000012 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent code injection attacks launched against application objects, including, at a minimum, application URLs and application code.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

JUSX-IP-000013 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

SonicWALL - SSL Control - Certs - Untrusted CATNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect Self-signed certsTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect Weak Ciphers (<64 bits)TNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Enable BlacklistTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY