2.1 Run BIND as a non-root User - process -u named | CIS BIND DNS v3.0.1 Caching Only Name Server | Unix | ACCESS CONTROL |
2.3.10.2 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.3.10.3 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.3.17.1 Ensure 'User Account Control: Admin Approval Mode for the Built-in Administrator account' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for standard users' is set to 'Automatically deny elevation requests' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.8 Ensure Dbcreator and Securityadmin roles are only used as needed | CIS Microsoft SharePoint 2019 DB v1.0.0 | MS_SQLDB | ACCESS CONTROL |
3.1 Set a nondeterministic Shutdown command value | CIS Apache Tomcat 9 L1 v1.2.0 | Unix | ACCESS CONTROL |
3.1.3 Require explicit authorization for cataloging | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
5.3 Ensure Linux Kernel Capabilities are restricted within containers | CIS Docker Community Edition v1.1.0 L1 Docker | Unix | ACCESS CONTROL |
6.9 Restrict at/cron To Authorized Users - should pass if /etc/cron.d/cron.allow permissions are OK. | CIS Solaris 10 L1 v5.2 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.deny | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.deny | CIS Solaris 11 L1 v1.1.0 | Unix | ACCESS CONTROL |
6.13 Restrict at/cron to Authorized Users - /etc/cron.d/cron.deny | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
7.1 Secure SYSADM authority - SYSADM Group Members | CIS IBM DB2 v10 v1.1.0 Linux OS Level 2 | Unix | ACCESS CONTROL |
7.2 Secure SYSCTRL authority - SYSCTRL Group | CIS IBM DB2 v10 v1.1.0 Windows OS Level 2 | Windows | ACCESS CONTROL |
7.3 Secure SYSMAINT Authority | CIS IBM DB2 v10 v1.1.0 Linux OS Level 1 | Unix | ACCESS CONTROL |
7.3 Secure SYSMAINT Authority | CIS IBM DB2 v10 v1.1.0 Windows OS Level 1 | Windows | ACCESS CONTROL |
7.4 Establish a system monitoring group | CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux | Unix | ACCESS CONTROL |
9.1.8 Restrict at/cron to Authorized Users - '/etc/at.allow' | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
9.1.8 Restrict at/cron to Authorized Users - '/etc/cron.allow' | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
9.1.8 Restrict at/cron to Authorized Users - /etc/at.deny | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.1.8 Restrict at/cron to Authorized Users - /etc/at.deny | CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0 | Unix | ACCESS CONTROL |
9.5 Verify No UID 0 Accounts Exist Other than root | CIS Solaris 11.1 L1 v1.0.0 | Unix | ACCESS CONTROL |
9.5 Verify No UID 0 Accounts Exist Other than root | CIS Solaris 11.2 L1 v1.1.0 | Unix | ACCESS CONTROL |
10.15 Do not allow cross context requests | CIS Apache Tomcat 8 L1 v1.1.0 | Unix | ACCESS CONTROL |
10.15 Do not allow cross context requests | CIS Apache Tomcat 8 L1 v1.1.0 Middleware | Unix | ACCESS CONTROL |
18.3.1 Ensure 'Apply UAC restrictions to local accounts on network logons' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
18.8.22.1.2 Ensure 'Turn off handwriting personalization data sharing' is set to 'Enabled' | CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
18.8.22.1.4 Ensure 'Turn off Internet Connection Wizard if URL connection is referring to Microsoft.com' is set to 'Enabled' | CIS Windows 7 Workstation Level 2 v3.2.0 | Windows | ACCESS CONTROL |
18.9.85.1 Ensure 'Allow user control over installs' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
18.9.85.2 Ensure 'Always install with elevated privileges' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
18.9.95.1 Ensure 'Turn on PowerShell Script Block Logging' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
18.9.95.2 Ensure 'Turn on PowerShell Transcription' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
18.9.95.2 Ensure 'Turn on PowerShell Transcription' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
Allow user control over installs | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows SmartScreen | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Enable local admin password management | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Ensure that database instances do not allow root access | Tenable Best Practices RackSpace v2.0.0 | Rackspace | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Network security: Allow LocalSystem NULL session fallback | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop. | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |