Item Search

NameAudit NamePluginCategory
3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

ACCESS CONTROL

4.3.2 Ensure DNS Filter logs all DNS queries and responsesCIS Fortigate 7.0.x v1.4.0 L1FortiGate

AUDIT AND ACCOUNTABILITY

Buffer overflow protection should be configured 'LimitRequestBody'TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

Buffer overflow protection should be configured 'LimitRequestline'TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND INFORMATION INTEGRITY

CGI-BIN directory should be disabled. 'Addmodule mod_cgi.c'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'AddModule mod_env.c'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'Directory'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'LoadModule cgi_module'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'ScriptAlias'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best Practice MiddlewareUnix
Configuring a secure password policy for the BIG-IP system - Expiration WarningTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Minimum DurationTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Required Special CharactersTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring an automatic logout for idle sessions - Configuration utilityTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Always accept important ICMPTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - enabledTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Packet filter loggingTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Review Packet-Filter RulesTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Unhandled Packet ActionTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring LDAP remote authentication for Active Directory - ScopeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSLTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring LDAP remote authentication for Active Directory - SSL Client KeyTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring the BIG-IP system to enforce the use of strict passwordsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Disabling the admin accountTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Disabling the root shell login accountTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Encryption protocols such as https should be usedTNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best Practice MiddlewareUnix
HTTP TRACE method should be disabled. 'RewriteCond'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

HTTP TRACE method should be disabled. 'RewriteEngine'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

HTTP TRACE method should be disabled. 'RewriteLog'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

HTTP TRACE method should be disabled. 'RewriteLogLevel'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

Keep Alive setting parameter value should be appropriately configured.TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Limit HTTP methods allowed by the Web Server.TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'CustomLog logs/access_log combined'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logging Directives should be restricted to authorized users. - 'LogLevel notice'TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

Logs containing auditing information should be secured at the directory level.TNS IBM HTTP Server Best Practice MiddlewareUnix

AUDIT AND ACCOUNTABILITY

MaxClients parameter value should be configured to appropriate value.TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

MaxSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Mitigating risk from SSH brute force login attacks - Monitor login attemptsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Non-Essential modules should be disabled. 'mod_info'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_status'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

O19C-00-009700 - Oracle roles granted using the WITH ADMIN OPTION must not be granted to unauthorized accounts.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

Overview of BIG-IP administrative access controlsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Overview of the HTTP profileTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Preserving or modifying HTTP response headers removed by the BIG-IP ASM systemTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Restricting access to the Configuration utility by source IP addressTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Settings to Lock Down your BIG-IP - Remote RoleTenable F5 BIG-IP Best Practice AuditF5

CONFIGURATION MANAGEMENT

Specifying allowable IP ranges for SSH accessTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

StartServers parameter value should be appropriately configured.TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

The BIG-IP Core implementation must be configured to protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing pattern recognition pre-processors when providing content filtering to virtual servers.Tenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION