Item Search

NameAudit NamePluginCategory
2.3.3 Familiarize users with screen lock tools or corner to Start Screen SaverCIS Apple macOS 10.13 L1 v1.1.0Unix

ACCESS CONTROL

2.4.4 Ensure Admin idle timeout time is configuredCIS FortiGate 7.4.x v1.0.1 L1FortiGate

ACCESS CONTROL

2.8 Protocol Access Controls - 'rsh.access has been configured'TNS NetApp Data ONTAP 7GNetApp

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.12 Ensure the correct messages are sent to the database clientCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure the correct messages are written to the server logCIS PostgreSQL 9.6 DB v1.0.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.12 Ensure the correct messages are written to the server logCIS PostgreSQL 10 DB v1.0.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.13 Ensure the correct messages are written to the server logCIS PostgreSQL 9.5 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.14 Ensure the correct messages are written to the server logCIS PostgreSQL 13 v1.3.0 L1 Database PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.14 Ensure the correct messages are written to the server logCIS PostgreSQL 12 DB v1.1.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.14 Ensure the correct messages are written to the server logCIS PostgreSQL 14 DB v 1.3.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.14 Ensure the correct messages are written to the server logCIS PostgreSQL 15 v1.2.0 L1 OS Linux PostgreSQLDBPostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.4 Ensure logging is enabled on all firewall policiesCIS Fortigate 7.0.x v1.4.0 L1FortiGate

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

3.8 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

ACCESS CONTROL

4.3.2 Ensure DNS Filter logs all DNS queries and responsesCIS FortiGate 7.4.x v1.0.1 L1FortiGate

AUDIT AND ACCOUNTABILITY

ARST-RT-000040 - The Arista BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.DISA Arista MLS EOS 4.X Router STIG v2r2Arista

ACCESS CONTROL

Configuring a pre-login or post-login message banner for the BIG-IP or Enterprise Manager system - Banner EnabledTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring a pre-login or post-login message banner for the BIG-IP or Enterprise Manager system - Banner TextTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring a secure password policy for the BIG-IP system - Maximum DurationTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Password MemoryTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Required Lowercase CharactersTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring a secure password policy for the BIG-IP system - Required Numeric CharactersTenable F5 BIG-IP Best Practice AuditF5

IDENTIFICATION AND AUTHENTICATION

Configuring an automatic logout for idle sessions - SSHTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring an automatic logout for idle sessions - TMSHTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Always accept ARPTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Filter established connectionsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Send ICMP error on packet rejectTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring LDAP remote authentication for Active Directory - SSL Check PeerTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Configuring the BIG-IP system to exclude inode information from EtagsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

EX13-EG-000145 - Exchange Receive connectors must control the number of recipients chunked on a single message.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000130 - The Exchange Public Folder database must not be overwritten by a restore.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000140 - The Exchange Mailbox database must not be overwritten by a restore.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-ED-000290 - Exchange Receive connectors must control the number of recipients chunked on a single message.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000118 - Exchange receive connectors must control the number of recipients chunked on a single message.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-RT-000040 - The Juniper BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUSX-DM-000039 - The Juniper SRX Services Gateway must allow only the information system security manager (ISSM) (or administrators/roles appointed by the ISSM) to select which auditable events are to be generated and forwarded to the syslog and/or local logs - or administrators/roles appointed by the ISSM to select which auditable events are to be generated and forwarded to the syslog and/or local logs.DISA Juniper SRX Services Gateway NDM v3r3Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

MaxKeepAliveRequests parameter value should be appropriately configured.TNS IBM HTTP Server Best Practice MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Mitigating an attack using TCP profilesTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_userdir'TNS IBM HTTP Server Best Practice MiddlewareUnix

CONFIGURATION MANAGEMENT

O19C-00-009500 - System privileges granted using the WITH ADMIN OPTION must not be granted to unauthorized user accounts.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

Tenable_Best_Practices_Citrix_ADC_v1.0.0.audit from Tenable Best PracticesTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery
TNS_Alcatel_Nokia_TiMOS_Best_Practices.audit from TNS Alcatel/Nokia TiMOS Best PracticesTNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice AuditAlcatel
VCST-67-000030 - The Security Token Service must set the secure flag for cookies.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCUI-67-000030 - vSphere UI must set the secure flag for cookies.DISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCUI-70-000032 - vSphere UI must set the secure flag for cookies.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-03-000127 - Oracle WebLogic must adhere to the principles of least functionality by providing only essential capabilities.Oracle WebLogic Server 12c Linux v2r2Unix

CONFIGURATION MANAGEMENT

WBLC-03-000127 - Oracle WebLogic must adhere to the principles of least functionality by providing only essential capabilities.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

CONFIGURATION MANAGEMENT

WBSP-AS-000970 - The WebSphere Application Server must disable JSP class reloading.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

CONFIGURATION MANAGEMENT