Item Search

NameAudit NamePluginCategory
1.2 Password Security Policy - e) Check for strong-password max-length - strong-password date-check enableTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

2.6 Ensure the SharePoint farm service account (database access account) is configured with the minimum privileges on the SQL server - OwnerCIS Microsoft SharePoint 2016 DB v1.1.0MS_SQLDB

ACCESS CONTROL

2.6 Ensure the SharePoint farm service account (database access account) is configured with the minimum privileges on the SQL server - RolesCIS Microsoft SharePoint 2016 DB v1.1.0MS_SQLDB
2.6 Turn off TRACE - check server.xmlCIS Apache Tomcat 8 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6 Turn off TRACE - check server.xmlCIS Apache Tomcat 8 L1 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

2.13 Ensure 'sa' Login Account is set to 'Disabled'CIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

2.13 Ensure 'sa' Login Account is set to 'Disabled'CIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

2.13 Ensure EFI version is valid and being regularly checked - daemonCIS Apple macOS 10.13 L1 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path MonitoringCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring EnabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Failure ConditionCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring EnabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Failure ConditionCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Failure ConditionCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1 Secure Db2 Runtime LibraryCIS IBM DB2 11 v1.1.0 Linux OS Level 1Unix

ACCESS CONTROL, MEDIA PROTECTION

5.26 Check container health at runtimeCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

7.6 Set Default umask for Users - Check if 'umask' is set to 077 - Check /etc/profile.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

9.2 Check for Duplicate User NamesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

9.2.8 Check User Dot File PermissionsCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.13 Check User Home Directory OwnershipCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.2.18 Check for Duplicate Group NamesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL

9.11 Check Groups in /etc/passwdCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

9.11 Check Groups in passwd(4)CIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.11 Check Groups in passwd(4)CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.11 Check Groups in passwd(4)CIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

9.14 Check User Home Directory OwnershipCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

9.14 Check User Home Directory OwnershipCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.18 Check for Duplicate Group NamesCIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.18 Check for Duplicate Group NamesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

9.18 Check for Duplicate User NamesCIS Solaris 10 L1 v5.2Unix

IDENTIFICATION AND AUTHENTICATION

9.18 Check for Duplicate User NamesCIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

9.19 Check for Duplicate Group NamesCIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

13.8 Check User Dot File PermissionsCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

13.8 Check User Dot File PermissionsCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

13.11 Check Groups in /etc/passwdCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

13.13 Check User Home Directory OwnershipCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

13.16 Check for Duplicate User NamesCIS Debian Linux 7 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

13.16 Check for Duplicate User NamesCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisLevelDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

GEN003608 - Proxy ARP must not be enabled on the system.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

OL09-00-000304 - OL 9 must be configured so that the file integrity tool verifies extended attributes.DISA Oracle Linux 9 STIG v1r2Unix

CONFIGURATION MANAGEMENT

RHEL-09-651035 - RHEL 9 must be configured so that the file integrity tool verifies extended attributes.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SLES-12-010520 - The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).DISA SLES 12 STIG v3r3Unix

CONFIGURATION MANAGEMENT

SLES-15-040040 - The SUSE operating system file integrity tool must be configured to verify Access Control Lists (ACLs).DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT

User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop.MSCT Windows 10 v1507 v1.0.0Windows

ACCESS CONTROL

User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop.MSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

User Account Control: Allow UIAccess applications to prompt for elevation without using the secure desktop.MSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

VCEM-67-000009 - ESX Agent Manager must only run one webapp.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

CONFIGURATION MANAGEMENT

VCLU-70-000009 - Lookup Service must only run one webapp.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

CONFIGURATION MANAGEMENT

VCSA-80-000281 - The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List (HCL) by use of an external proxy server.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT