Item Search

NameAudit NamePluginCategory
5.31 (L2) Ensure 'Windows Event Collector (Wecsvc)' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

CONFIGURATION MANAGEMENT

Ensure password creation requirements are configured - pwquality.conf ocreditTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure password expiration is 365 days or lessTenable Cisco Firepower Management Center OS Best Practices AuditUnix

IDENTIFICATION AND AUTHENTICATION

Ensure permissions on /etc/cron.hourly are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure permissions on /etc/crontab are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure permissions on /etc/passwd- are configuredTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure root PATH IntegrityTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure rsh server is not enabled - rexecTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure rsh server is not enabled - rloginTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure rsh server is not enabled - rshTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure secure ICMP redirects are not accepted - /etc/sysctl ipv4 all secureTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure separate partition exists for /varTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure session initiation information is collected - auditctl btmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure session initiation information is collected - btmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure source routed packets are not accepted - /etc/sysctl ipv4 all accceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure source routed packets are not accepted - sysctl ipv4 all accceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure source routed packets are not accepted - sysctl ipv4 default acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure successful file system mounts are collected - auditctl b64Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure suspicious packets are logged - /etc/sysctl ipv4 default log_martiansTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure suspicious packets are logged - sysctl ipv4 all log_martiansTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure talk client is not installed - dpkgTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure talk server is not enabled - ntalkTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure telnet client is not installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure telnet client is not installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure the MCS Translation Service (mcstrans) is not installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure the MCS Translation Service (mcstrans) is not installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure unsuccessful unauthorized file access attempts are collected - b32 EACCESTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure unsuccessful unauthorized file access attempts are collected - b64 EACCESTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Lockout for failed password attempts - 'auth sufficient pam_unix.so'Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Lockout for failed password attempts - password-auth 'auth sufficient pam_faillock.so authsucc audit deny=5 unlock_time=900'Tenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

SQL6-D0-003600 - SQL Server must limit the number of concurrent sessions to an organization-defined number per user for all accounts and/or account types.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

ACCESS CONTROL

SQL6-D0-005500 - SQL Server must include additional, more detailed, organization-defined information in the audit records for audit events identified by type, location, or subject.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-006700 - SQL Server software installation account must be restricted to authorized users.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

CONFIGURATION MANAGEMENT

SQL6-D0-007100 - Unused database components that are integrated in SQL Server and cannot be uninstalled must be disabled.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-007200 - Access to xp_cmdshell must be disabled, unless specifically required and approved.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-007400 - Access to Non-Standard extended stored procedures must be disabled or restricted, unless specifically required and approved.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-007800 - SQL Server must uniquely identify and authenticate organizational users (or processes acting on behalf of organizational users).DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-007900 - If DBMS authentication using passwords is employed, SQL Server must enforce the DOD standards for password complexity and lifetime.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-008300 - Confidentiality of information during transmission is controlled through the use of an approved TLS version.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-009700 - The Master Key must be backed up and stored in a secure location that is not on the SQL Server.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-009900 - SQL Server must prevent unauthorized and unintended information transfer via Instant File Initialization (IFI).DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-011500 - Windows must enforce access restrictions associated with changes to the configuration of the SQL Server instance.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

CONFIGURATION MANAGEMENT

SQL6-D0-012400 - SQL Server services must be configured to run under unique dedicated user accounts.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-012800 - Security-relevant software updates to SQL Server must be installed within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

SQL6-D0-013200 - SQL Server must generate audit records when successful and unsuccessful attempts to access categorized information (e.g., classification levels/security levels) occur.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-014800 - SQL Server must generate audit records when successful and unsuccessful logons or connection attempts occur.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-015200 - SQL Server must generate audit records when concurrent logons/connections by the same user from different workstations occur.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL6-D0-015600 - SQL Server must implement NIST FIPS 140-2 or 140-3 validated cryptographic modules to provision digital signatures.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL6-D0-016600 - SQL Server Service Broker endpoint must utilize AES encryption.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-018200 - Applications must obscure feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION