Item Search

NameAudit NamePluginCategory
3.1.2 Set 'no ip proxy-arp'CIS Cisco IOS XE 16.x v2.2.0 L2Cisco

CONFIGURATION MANAGEMENT

4.1.3 Ensure EBGP peers are set to use GTSMCIS Juniper OS Benchmark v2.1.0 L1Juniper

CONFIGURATION MANAGEMENT

4.1.6 Ensure RPKI is set for Origin Validation of EBGP peersCIS Juniper OS Benchmark v2.1.0 L2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

4.10.31.1 (L1) Ensure 'Enable RPC Endpoint Mapper Client Authentication' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

6.4.1 Ensure Authentication is configured for Diagnostic PortsCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

6.7.3 Ensure NTP Boot-Server is setCIS Juniper OS Benchmark v2.1.0 L2Juniper

AUDIT AND ACCOUNTABILITY

6.7.4 Ensure NTP uses version 4CIS Juniper OS Benchmark v2.1.0 L1Juniper

AUDIT AND ACCOUNTABILITY

6.8.5 Ensure Source-Address is set for External AAA ServersCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

6.10.1.2 Ensure SSH is Restricted to Version 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

AIX7-00-002057 - AIX audit logs must be rotated daily.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

ARST-RT-000090 - The Arista MSDP router must be configured to limit the amount of source-active messages it accepts on per-peer basis.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000090 - The Arista MSDP router must be configured to limit the amount of source-active messages it accepts on per-peer basis.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL

ARST-RT-000280 - The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

ARST-RT-000280 - The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

ARST-RT-000650 - The Arista perimeter router must be configured to block all outbound management traffic.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000650 - The Arista perimeter router must be configured to block all outbound management traffic.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-RT-000770 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to use its loopback address as the source address when originating MSDP traffic.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

CONTINGENCY PLANNING

CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic.DISA Cisco IOS Router RTR STIG v3r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic.DISA Cisco IOS XE Router RTR STIG v3r5Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000390 - The Cisco perimeter router must be configured to block all outbound management traffic.DISA Cisco IOS XR Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.DISA Cisco IOS Router RTR STIG v3r4Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.DISA Cisco IOS XR Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.DISA Cisco IOS XE Router RTR STIG v3r5Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DG0152-ORACLE11 - DBMS network communications should comply with PPS usage restrictions - 'Connection Manager is running on approved ports'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

CONFIGURATION MANAGEMENT

DG0152-ORACLE11 - DBMS network communications should comply with PPS usage restrictions - 'Oracle listeners are running on approved ports'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

CONFIGURATION MANAGEMENT

DG0152-ORACLE11 - DBMS network communications should comply with PPS usage restrictions - PORT = 1521, 1575, 1830, 2481, 2482, 2483 or 2484' - cman.oraDISA STIG Oracle 11 Installation v9r1 WindowsWindows

CONFIGURATION MANAGEMENT

DG0152-ORACLE11 - DBMS network communications should comply with PPS usage restrictions - PORT = 1521, 1575, 1830, 2481, 2482, 2483 or 2484' - listener.oraDISA STIG Oracle 11 Installation v9r1 WindowsWindows

CONFIGURATION MANAGEMENT

DISA STIG VMware vSphere ESXi 6 Security Technical Implementation Guide Version 1 Release 5DISA VMware vSphere ESXi 6.0 STIG v1r5 UnixUnix
DISA_STIG_JRE_8_Windows_v2r1.audit for DISA Oracle Java Runtime Environment (JRE) Version 8 for Windows v2r1 STIGDISA STIG Oracle JRE 8 Windows v2r1Windows
DISA_STIG_McAfee_VirusScan_8.8_Managed_Client_v6r1.audit from DISA McAfee VirusScan 8.8 Managed Client Security Technical implementation Guide v6r1 STIGDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows
DISA_STIG_McAfee_VSEL_1.9.x_2.0.x_Local_Client_v1r6.audit from DISA McAfee VSEL 1.9/2.0 Local Client v1r6 STIGMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix
DISA_STIG_McAfee_VSEL_1.9.x_2.0.x_Managed_Client_v1r5.audit from DISA McAfee VSEL 1.9/2.0 Managed Client v1r5 STIGMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix
DISA_STIG_Microsoft_Project_2016_v1r1.audit for Microsoft Project 2016, from DISA STIG Microsoft Project 2016 v1r1DISA STIG Microsoft Project 2016 v1r1Windows
DISA_STIG_Server_2012_and_2012_R2_DC_v3r7.audit from DISA Microsoft Windows Server 2012/2012 R2 Domain Controller v3r7 STIGDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows
DISA_STIG_Server_2012_and_2012_R2_MS_v3r7.audit from DISA Microsoft Windows Server 2012/2012 R2 Member Server v3r7 STIGDISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows
DISA_STIG_Splunk_Enterprise_7.x_for_Windows_OS_v3r2.audit from DISA Splunk Enterprise 7.x for Windows v3r2 STIGDISA STIG Splunk Enterprise 7.x for Windows v3r2 OSWindows
DISA_STIG_Splunk_Enterprise_7.x_for_Windows_REST_API_v3r2.audit from DISA Splunk Enterprise 7.x for Windows v3r2 STIGDISA STIG Splunk Enterprise 7.x for Windows v3r2 REST APISplunk
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_OS_v2r3.audit from DISA Splunk Enterprise 8.x for Linux v2r3 STIGDISA STIG Splunk Enterprise 8.x for Linux v2r3 STIG OSUnix
DISA_STIG_Splunk_Enterprise_8.x_for_Linux_REST_API_v2r3.audit from DISA Splunk Enterprise 8.x for Linux v2r3 STIGDISA STIG Splunk Enterprise 8.x for Linux v2r3 STIG REST APISplunk
DISA_STIG_VMware_vSphere_7.0_Photon_OS_v1r4.audit from DISA VMware vSphere 7.0 vCenter Appliance Photon OS v1r4 STIGDISA STIG VMware vSphere 7.0 Photon OS v1r4Unix
DISA_STIG_VMware_vSphere_8.0_vCenter_Appliance_Photon_OS_4.0_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix
DISA_VMware_vSphere_8.0_vCenter_Appliance_Management_Interface_(VAMI)_STIG_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance Management Interface (VAMI) STIG v2r1Unix
JUSX-AG-000083 - The Juniper SRX Services Gateway Firewall must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.DISA Juniper SRX Services Gateway ALG v3r3Juniper

CONFIGURATION MANAGEMENT

JUSX-AG-000087 - The Juniper SRX Services Gateway Firewall must be configured to prohibit or restrict the use of unauthorized functions, ports, protocols, and/or services, as defined in the PPSM CAL, vulnerability assessments.DISA Juniper SRX Services Gateway ALG v3r3Juniper

CONFIGURATION MANAGEMENT

JUSX-AG-000120 - The Juniper SRX Services Gateway Firewall providing content filtering must protect against known and unknown types of denial-of-service (DoS) attacks by implementing statistics-based screens - DoS attacks by implementing statistics-based screens.DISA Juniper SRX Services Gateway ALG v3r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-AG-000122 - The Juniper SRX Services Gateway Firewall must protect against known types of denial-of-service (DoS) attacks by implementing signature-based screens - DoS attacks by implementing signature-based screens.DISA Juniper SRX Services Gateway ALG v3r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-DM-000162 - The Juniper SRX Services Gateway must configure the control plane to protect against or limit the effects of common types of Denial of Service (DoS) attacks on the device itself by configuring applicable system options and internet-options.DISA Juniper SRX Services Gateway NDM v3r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000010 - The Juniper Networks SRX Series Gateway IDPS must install updates for predefined signature objects, applications signatures, IDPS policy templates, and device software when new releases are available in accordance with organizational configuration management policy and procedures.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

JUSX-VN-000015 - The Juniper SRX Services Gateway must disable or remove unnecessary network services and functions that are not used as part of its role in the architecture.DISA Juniper SRX Services Gateway VPN v3r2Juniper

CONFIGURATION MANAGEMENT

JUSX-VN-000017 - The Juniper SRX Services Gateway VPN must be configured to prohibit or restrict the use of functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.DISA Juniper SRX Services Gateway VPN v3r2Juniper

CONFIGURATION MANAGEMENT