Item Search

NameAudit NamePluginCategory
1.1.4.4 system accountingCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.1.9 - MobileIron - Turn off Ask to Join NetworksMobileIron - CIS Apple iOS 8 v1.0.0 L2MDM

ACCESS CONTROL

1.4 Ensure Check for Password Reuse is selected and History Length is set to 12 or more - history-checkingCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

1.4 Ensure Check for Password Reuse is selected and History Length is set to 12 or more - history-lengthCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

2.1.4 Ensure Config-state is savedCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.1.8 Ensure Host Name is setCIS Check Point Firewall L1 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

2.2.3 Ensure SNMP traps is enabled - authorizationErrorCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.5.2 Ensure Web session timeout is set to less than or equal to 10 minutesCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

2.5.7 Monitor Location Services AccessCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6.3 Ensure cplogs is set to onCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

3.8 Logging should be enable for all Firewall RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY, SECURITY ASSESSMENT AND AUTHORIZATION

3.9 Review and Log Implied RulesCIS Check Point Firewall L2 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all InterfacesCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.16 Ensure Accept Domain Name over UDP (Queries) is not enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.17 Ensure Accept ICMP Requests is not enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.9.7.1.6 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

Allow Trusted Locations on the network - allownetworklocations - excelMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - excelMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - ms projectMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - ms projectMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - visioMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - visioMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - visioMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - visioMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - excelMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - ms projectMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - visioMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - visioMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

DTAVSEL-107 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-110 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-111 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTOO134 - Disallowance of trusted locations on the network must be enforced.DISA STIG Microsoft Excel 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-PT-000013 - The use of network locations must be ignored in PowerPoint.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

O365-VI-000002 - Trusted Locations on the network must be disabled in Visio.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000021 - The Red Hat Enterprise Linux operating system must not contain .shosts or shosts.equiv files.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-010341 - The Red Hat Enterprise Linux operating system must restrict privilege elevation to authorized personnel.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030360 - The Red Hat Enterprise Linux operating system must audit all executions of privileged functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-040520 - The Red Hat Enterprise Linux operating system must enable an application firewall, if available.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040830 - The Red Hat Enterprise Linux operating system must not forward IPv6 source-routed packets.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT