Item Search

NameAudit NamePluginCategory
1.8.2 Ensure GDM login banner is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.8.2 Ensure GDM login banner is configured - banner message enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.2 Ensure GDM login banner is configured - banner message enabledCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.2 Ensure GDM login banner is configured - banner message textCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.2 Ensure GDM login banner is configured - file-dbCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.2 Ensure GDM login banner is configured - system-db:gdmCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.2 Ensure GDM login banner is configured - user-db:userCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.1.2.3 Ensure company contacts is set to disabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

3.19 (L1) Host must have an accurate Exception Users listCIS VMware ESXi 8.0 v1.2.0 L1VMware

ACCESS CONTROL, MEDIA PROTECTION

4.1.7 Ensure events that modify the system's network environment are collected - auditctl b64 sethostnameCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl b64 sethostnameCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - b64 sethostnameCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - b64 sethostnameCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

6.12 Update the Java Runtime Environment (JRE) regularly if Java is in useCIS Sybase 15.0 L2 OS Windows v1.1.0Windows
6.12 Update the Java Runtime Environment (JRE) regularly if Java is in useCIS Sybase 15.0 L2 OS Unix v1.1.0Unix

CONFIGURATION MANAGEMENT

11.1 Ensure SELinux Is Enabled in Enforcing ModeCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, MEDIA PROTECTION

18.8.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

18.8.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-L3-000230 - The Arista Multilayer Switch must be configured to restrict it from accepting outbound IP packets that contain an illegitimate address in the source address field via egress filter or by enabling Unicast Reverse Path Forwarding.DISA STIG Arista MLS DCS-7000 Series RTR v1r4Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000075 - The connectivity between VSAN Health Check and public Hardware Compatibility List must be disabled or restricted by use of an external proxy server.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-80-000201 - The ESXi host lockdown mode exception users list must be verified.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

IIST-SI-000215 - Mappings to unused and vulnerable scripts on the IIS 10.0 website must be removed.DISA IIS 10.0 Site v2r11Windows

CONFIGURATION MANAGEMENT

IIST-SI-000216 - The IIS 10.0 website must have resource mappings set to disable the serving of certain file types.DISA IIS 10.0 Site v2r11Windows

CONFIGURATION MANAGEMENT

IISW-SI-000215 - Mappings to unused and vulnerable scripts on the IIS 8.5 website must be removed.DISA IIS 8.5 Site v2r9Windows

CONFIGURATION MANAGEMENT

RHEL-07-010291 - The Red Hat Enterprise Linux operating system must not have accounts configured with blank or null passwords.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-010343 - The Red Hat Enterprise Linux operating system must require re-authentication when using the 'sudo' command - sudo command.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010344 - The Red Hat Enterprise Linux operating system must not be configured to bypass password requirements for privilege escalation.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-020200 - The Red Hat Enterprise Linux operating system must remove all software components after updated versions have been installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-021340 - The Red Hat Enterprise Linux operating system must use a separate file system for /tmp (or equivalent).DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030620 - The Red Hat Enterprise Linux operating system must generate audit records for all successful account access events.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-07-030740 - The Red Hat Enterprise Linux operating system must audit all uses of the mount command and syscall.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, MAINTENANCE

RHEL-07-030820 - The Red Hat Enterprise Linux operating system must audit all uses of the init_module and finit_module syscalls.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

RHEL-07-040300 - The Red Hat Enterprise Linux operating system must be configured so that all networked systems have SSH installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-040670 - Network interfaces configured on the Red Hat Enterprise Linux operating system must not be in promiscuous mode.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040730 - The Red Hat Enterprise Linux operating system must not have a graphical display manager installed unless approved.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040800 - SNMP community strings on the Red Hat Enterprise Linux operating system must be changed from the default.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-910055 - The Red Hat Enterprise Linux operating system must protect audit information from unauthorized read, modification, or deletion.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

SOL-11.1-020030 - The operating system must protect audit tools from unauthorized access.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020030 - The operating system must protect audit tools from unauthorized access.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020040 - The operating system must protect audit tools from unauthorized modification.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020040 - The operating system must protect audit tools from unauthorized modification.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020050 - The operating system must protect audit tools from unauthorized deletion.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 X86 v3r1Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020080 - System packages must be configured with the vendor-provided files, permissions, and ownerships.DISA STIG Solaris 11 SPARC v3r1Unix

AUDIT AND ACCOUNTABILITY

SPLK-CL-000175 - Splunk Enterprise forwarders must be configured with Indexer Acknowledgement enabled.DISA STIG Splunk Enterprise 7.x for Windows v3r1 OSWindows

CONFIGURATION MANAGEMENT

SPLK-CL-000290 - Splunk Enterprise must be configured to send an immediate alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

VCTR-67-000054 - The vCenter Server must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List by use of an external proxy server.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000053 - The connectivity between VSAN Health Check and public Hardware Compatibility List must be disabled or restricted.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000054 - The vCenter Server for Windows must disable or restrict the connectivity between vSAN Health Check and public Hardware Compatibility List by use of an external proxy server.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT