Item Search

NameAudit NamePluginCategory
1.1.1.1 Configure AAA Authentication - TACACS if applicableCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL

1.2.5 Set 'access-class' for 'line vty'CIS Cisco IOS XE 17.x v2.2.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

2.2.32 Ensure 'Deny log on locally' to include 'Guests' (STIG DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.2.46 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop or Prompt for credentials on the secure desktop' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

3.3.1 Configure DHCP TrustCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

CASA-ND-000240 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful attempts to access privileges occur.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-000260 - The Cisco ASA must be configured to produce audit log records containing sufficient information to establish what type of event occurred.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-000280 - The Cisco ASA must be configured to produce audit records containing information to establish where the events occurred.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-000290 - The Cisco ASA must be configured to produce audit log records containing information to establish the source of events.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-000300 - The Cisco ASA must be configured to produce audit records that contain information to establish the outcome of the event.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-000320 - The Cisco ASA must be configured to generate audit records containing the full-text recording of privileged commands.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CASA-ND-001220 - The Cisco ASA must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CIS_Cisco_ASA_9.x_Firewall_v1.1.0_L2.audit from CIS Cisco ASA 9.x Firewall Benchmark v1.1.0CIS Cisco ASA 9.x Firewall L2 v1.1.0Cisco
CISC-RT-000370 - The Cisco perimeter router must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA Cisco IOS XR Router RTR STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter router must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000065 - All port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-65-000065 - For the ESXi host all port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000065 - All port groups on standard switches must not be configured to virtual local area network (VLAN) values reserved by upstream physical switches.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

Include Login in Session RecordsTenable Cisco ACICisco_ACI

AUDIT AND ACCOUNTABILITY

JUSX-IP-000018 - The Juniper Networks SRX Series Gateway IDPS must protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing anomaly-based detection.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000067 The Photon operating system must restrict access to the kernel message buffer.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000068 The Photon operating system must be configured to use TCP syncookies.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000105 The Photon operating system must enable symlink access control protection in the kernel.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

ACCESS CONTROL

PHTN-40-000160 The Photon operating system must implement address space layout randomization to protect its memory from unauthorized code execution.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND INFORMATION INTEGRITY

PHTN-40-000224 The Photon operating system must not respond to IPv4 Internet Control Message Protocol (ICMP) echoes sent to a broadcast address.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000225 The Photon operating system must prevent IPv4 Internet Control Message Protocol (ICMP) redirect messages from being accepted.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000226 The Photon operating system must prevent IPv4 Internet Control Message Protocol (ICMP) secure redirect messages from being accepted.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000228 The Photon operating system must log IPv4 packets with impossible addresses.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000231 The Photon operating system must not perform IPv4 packet forwarding.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000232 The Photon operating system must send TCP timestamps.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000244 The Photon operating system must enable hardlink access control protection in the kernel.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000246 The Photon operating system must restrict core dumps.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

Remote Location - ProtocolTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT

WNFWA-000002 - Windows Defender Firewall with Advanced Security must be enabled when connected to a private network.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL

WNFWA-000003 - Windows Defender Firewall with Advanced Security must be enabled when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

ACCESS CONTROL

WNFWA-000004 - Windows Defender Firewall with Advanced Security must block unsolicited inbound connections when connected to a domain.DISA Microsoft Windows Firewall v2r2Windows

CONFIGURATION MANAGEMENT

WNFWA-000010 - Windows Defender Firewall with Advanced Security must log dropped packets when connected to a domain.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

WNFWA-000012 - Windows Defender Firewall with Advanced Security must block unsolicited inbound connections when connected to a private network.DISA Microsoft Windows Firewall v2r2Windows

CONFIGURATION MANAGEMENT

WNFWA-000018 - Windows Defender Firewall with Advanced Security must log dropped packets when connected to a private network.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

WNFWA-000019 - Windows Defender Firewall with Advanced Security must log successful connections when connected to a private network.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

WNFWA-000020 - Windows Defender Firewall with Advanced Security must block unsolicited inbound connections when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

CONFIGURATION MANAGEMENT

WNFWA-000021 - Windows Defender Firewall with Advanced Security must allow outbound connections, unless a rule explicitly blocks the connection when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNFWA-000025 - Windows Defender Firewall with Advanced Security local connection rules must not be merged with Group Policy settings when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNFWA-000027 - Windows Defender Firewall with Advanced Security log size must be configured for public network connections.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY

WNFWA-000028 - Windows Defender Firewall with Advanced Security must log dropped packets when connected to a public network.DISA Microsoft Windows Firewall v2r2Windows

AUDIT AND ACCOUNTABILITY