Item Search

NameAudit NamePluginCategory
2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 18c Linux v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 18c Windows v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'MobileIron - CIS Apple iOS 17 v1.1.0 End User Owned L1MDM

CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.1.4 Ensure 'Force encrypted backups' is set to 'Enabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

CONTINGENCY PLANNING, SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.25 Ensure 'Allow sending diagnostic and usage data to Apple' is set to 'Disabled'AirWatch - CIS Apple iOS 17 Benchmark v1.1.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.1.1.4 Ensure only one logging system is in useCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.1.1.4 Ensure only one logging system is in useCIS Debian Linux 12 v1.1.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.1.4 Ensure only one logging system is in useCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databasesCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

12.03 Unix root group members on host - 'Disallow 'oracle' as a member of root group'CIS v1.1.0 Oracle 11g OS L1Unix

ACCESS CONTROL

Adtran : Disable SSID BroadcastTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable aaa authenticationTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Ensure the default 'admin' username is not usedTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Firewall - Ensure winnuke protection is enabledTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Password Policy - no weak passwordsTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Secure Web Access - HTTP disabledTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Copy and paste between work and personal profilesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

APPL-15-005110 - The macOS system must enforce enrollment in Mobile Device Management (MDM).DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

CONFIGURATION MANAGEMENT

Catalina - Enforce Enrollment in Mobile Device ManagementNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

CONFIGURATION MANAGEMENT

Catalina - Enforce Enrollment in Mobile Device ManagementNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

CONFIGURATION MANAGEMENT

Catalina - Enforce Enrollment in Mobile Device ManagementNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

CONFIGURATION MANAGEMENT

Catalina - Enforce Enrollment in Mobile Device ManagementNIST macOS Catalina v1.5.0 - 800-171Unix

CONFIGURATION MANAGEMENT

Catalina - Enforce Enrollment in Mobile Device ManagementNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

CONFIGURATION MANAGEMENT

Extreme : Configure idletimeout <= 15TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : Password Policy - char-validationTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Extreme : Password Policy - min-length >= 8TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Huawei: Command Levels Not ChangedTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Configure appropriate NTP serverTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: Enable AAA authenticationTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Enable SNMP TrapsTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: External Syslog server is configuredTNS Huawei VRP Best Practice AuditHuawei
Huawei: Insecure HTTP is not configured.TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Require Group for SNMPv3 AccessTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Huawei: Require SSH version 2TNS Huawei VRP Best Practice AuditHuawei
Huawei: Set appropriate 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set super passwordTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Set System NameTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: SNMP Community string != privateTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: SNMP is ConfiguredTNS Huawei VRP Best Practice AuditHuawei
WatchGuard : Authentication Settings - 'Authentication User Session Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : Data Loss Prevention Signature Update - 'Enabled'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

WatchGuard : DoS Prevention - Block Port Space ProbesTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Drop SYN Flood AttackTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : IPS Threat Level Action Medium - DROP or BLOCKTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND INFORMATION INTEGRITY

WatchGuard : SNMP Configuration - community string - 'public'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION

WatchGuard : SNMP Configuration - v3 user has password - auth protocolTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : SNMP Configuration - Version = '3'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY