Item Search

NameAudit NamePluginCategory
1.6.1.2 Ensure SELinux is not disabled in bootloader configurationCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

1.7.1.2 Ensure SELinux is not disabled in bootloader configuration - selinuxCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL

2.2.1 Ensure 'ACCEPT_MD5_CERTS' Is NOT SETCIS Oracle Database 23ai v1.0.0 L1 RDBMS On Windows Server Host OSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.5.14.3.1.2 (L1) Ensure 'Do not prompt about Level 1 attachments when sending an item' is set to 'Disabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

3.1.5 - MobileIron - Set the 'timeout' for 'Time without user input before password must be re-entered (in minutes)'MobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

5.2.2.9 (L1) Ensure a managed device is required for authenticationCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.2.2.10 (L1) Ensure a managed device is required to register security informationCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.7 Ensure SSH HostbasedAuthentication is disabledCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.8 Ensure SSH HostbasedAuthentication is disabledCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.9 Ensure SSH HostbasedAuthentication is disabledCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.2.9 Ensure SSH HostbasedAuthentication is disabledCIS Distribution Independent Linux Server L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.9 Ensure SSH HostbasedAuthentication is disabledCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.9 Ensure SSH HostbasedAuthentication is disabledCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.9 Ensure SSH HostbasedAuthentication is disabledCIS Debian 9 Workstation L1 v1.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.2.9 Ensure SSH HostbasedAuthentication is disabledCIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.10 Ensure SSH HostbasedAuthentication is disabledCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.3.10 Ensure SSH HostbasedAuthentication is disabledCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

5.3.11 Ensure SSH HostbasedAuthentication is disabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.11 Ensure SSH HostbasedAuthentication is disabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

9.3.7 Set SSH HostbasedAuthentication to NoCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.3.7 Set SSH HostbasedAuthentication to NoCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Big Sur - Configure Apple System Log Files Owned by Root and Group to WheelNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Configure Apple System Log Files Owned by Root and Group to WheelNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 3b576869-a4ec-4529-8536-b80a7769e899MSCT Windows 10 v20H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 3b576869-a4ec-4529-8536-b80a7769e899MSCT Windows 10 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 9e6c4e1f-7d60-472f-ba1a-a39ef669e4b2MSCT Windows Server v20H2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 56a863a9-875e-4185-98a7-b882c64b5ce5MSCT Windows 10 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 92E97FA1-2EDF-4476-BDD6-9DD0B4DDDC7BMSCT Windows Server v20H2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2cMSCT Windows 10 v2004 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2cMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 7674ba52-37eb-4a4f-a9a1-f0f9a1619a2cMSCT Windows 10 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84MSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - 26190899-1602-49e8-8b27-eb1d0a1ce869MSCT Windows 10 v20H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - be9ba2d9-53ea-4cdc-84e5-9b1eeee46550MSCT Windows 10 v20H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - be9ba2d9-53ea-4cdc-84e5-9b1eeee46550MSCT Windows 10 v21H1 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - be9ba2d9-53ea-4cdc-84e5-9b1eeee46550MSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - c1db55ab-c21a-4637-bb3f-a12568109d35MSCT Windows Server v20H2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - d4f940ab-401b-4efc-aadc-ad5f3c50688aMSCT Windows 10 v21H1 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - e6db77e5-3df2-4cf1-b95a-636979351e5bMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - ExploitGuard_ASR_RulesMSCT Windows Server v20H2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - ExploitGuard_ASR_RulesMSCT Windows 10 1909 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Configure Attack Surface Reduction rules - ExploitGuard_ASR_RulesMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Monterey - Configure Apple System Log Files Owned by Root and Group to WheelNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000228 - The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

RHEL-07-010482 - Red Hat Enterprise Linux operating systems version 7.2 or newer with a Basic Input/Output System (BIOS) must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-08-010150 - RHEL 8 operating systems booted with a BIOS must require authentication upon booting into single-user and maintenance modes.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

ACCESS CONTROL

VCEM-67-000003 - ESX Agent Manager must limit the maximum size of a POST request.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

ACCESS CONTROL

VCLD-67-000034 - VAMI must implement TLS1.2 exclusively - sslv2DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION