Item Search

NameAudit NamePluginCategory
1.16 WN10-00-000070CIS Microsoft Windows 10 STIG v1.0.0 CAT IWindows

ACCESS CONTROL

2.2.38 (L1) Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.38 (L1) Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.38 (L1) Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.38 (L1) Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.38 (L1) Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.38 Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.2.38 Ensure 'Shut down the system' is set to 'Administrators, Users'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

5.3.6 Ensure SSH access is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.7 Ensure SSH LogLevel is appropriateCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.3.14 Ensure SSH PermitUserEnvironment is disabledCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.18 Ensure only strong Key Exchange algorithms are usedCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.19 Ensure SSH Idle Timeout Interval is configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.20 Ensure SSH LoginGraceTime is set to one minute or lessCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.22 Ensure SSH PAM is enabledCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.4.1 Ensure password creation requirements are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

5.5.3 Ensure default group for the root account is GID 0CIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.4 Ensure default user shell timeout is configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL

5.6 Ensure root login is restricted to system consoleCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, MAINTENANCE, SYSTEM AND SERVICES ACQUISITION

6.1.7 Ensure permissions on /etc/gshadow are configuredCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.1.11 Ensure no unowned files or directories existCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.9 Ensure root is the only UID 0 accountCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.11 Ensure all users' home directories existCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.12 Ensure users own their home directoriesCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.5.2 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated cryptographic modulesCIS VMware ESXi 8.0 v1.2.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

9.3.1 Set SSH Protocol to 2CIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.3.1 Set SSH Protocol to 2CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

17.5.4 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

AUDIT AND ACCOUNTABILITY

17.5.4 Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

AUDIT AND ACCOUNTABILITY

17.5.5 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'CIS Microsoft Windows Server 2025 v1.0.0 L1 DCWindows

AUDIT AND ACCOUNTABILITY

17.5.5 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

AUDIT AND ACCOUNTABILITY

17.5.5 (L1) Ensure 'Audit Other Logon/Logoff Events' is set to 'Success and Failure'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

AUDIT AND ACCOUNTABILITY

18.10.82.1 (L1) Ensure 'Configure the transmission of the user's password in the content of MPR notifications sent by winlogon.' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.82.1 (L1) Ensure 'Configure the transmission of the user's password in the content of MPR notifications sent by winlogon.' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

CONFIGURATION MANAGEMENT

24.4 (L1) Ensure 'Require Platform Security Features' is set to 'Turns on VBS with Secure Boot' or higherCIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

90.2 (L1) Ensure 'Require UEFI Memory Attributes Table' is set to 'Require UEFI Memory Attributes Table'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

CIS_MS_Windows_8.1_v2.4.1_Level_1.audit from CIS Microsoft Windows 8.1 Workstation Benchmark v2.4.1CIS Microsoft Windows 8.1 v2.4.1 L1Windows
Enable IKE Version 1/2 - groupTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Enable IKE Version 1/2 - rekeyTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

IBM i : Device Recovery Action (QDEVRCYACN) - '*DSCMSG'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT

Interactive logon: Smart card removal behaviorMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows 10 v20H2 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows 10 v21H2 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows 11 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows Server v2004 MS v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behaviorMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behavior - ScRemoveOptionMSCT Windows Server 2025 DC v1.0.0Windows

ACCESS CONTROL

Interactive logon: Smart card removal behavior - ScRemoveOptionMSCT Windows Server 2025 MS v1.0.0Windows

ACCESS CONTROL