Item Search

NameAudit NamePluginCategory
1.1.3.17.2 Set 'User Account Control: Detect application installations and prompt for elevation' to 'Enabled'CIS Windows 8 L1 v1.0.0Windows

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.3.3 Ensure sudo log file existsCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

1.3.3 Ensure sudo log file existsCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

2.3 Ensure monitoring and alerting exist for password sign-ins of SSO usersCIS Snowflake Foundations v1.0.0 L1Snowflake

AUDIT AND ACCOUNTABILITY

5.2.3 Ensure sudo log file existsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

5.2.3 Ensure sudo log file existsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

CONFIGURATION MANAGEMENT

6.1 Ensure that MongoDB uses a non-default portCIS MongoDB 8 v1.0.0 L1 UnixUnix

CONFIGURATION MANAGEMENT

6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

RISK ASSESSMENT

6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

RISK ASSESSMENT

9.1.7.3 Ensure That Microsoft Defender for (Managed Instance) Azure SQL Databases Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

9.1.7.4 Ensure That Microsoft Defender for SQL Servers on Machines Is Set To 'On'CIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

RISK ASSESSMENT, SYSTEM AND SERVICES ACQUISITION

12.50 Intrusion detection system on host - 'Utilize'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows
CIS_Azure_Compute_Microsoft_Windows_Server_2019_v1.0.0_L1_MS.audit from CIS Azure Compute Microsoft Windows Server 2019 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows
CIS_Azure_Compute_Microsoft_Windows_Server_2022_v1.0.0_L1_DC.audit from CIS Azure Compute Microsoft Windows Server 2022 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows
CIS_Azure_Compute_Microsoft_Windows_Server_2022_v1.0.0_L1_MS.audit from CIS Azure Compute Microsoft Windows Server 2022 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows
CIS_Azure_Compute_Microsoft_Windows_Server_2022_v1.0.0_NG_DC.audit from CIS Azure Compute Microsoft Windows Server 2022 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 NG DCWindows
CIS_Azure_Compute_Microsoft_Windows_Server_2022_v1.0.0_NG_MS.audit from CIS Azure Compute Microsoft Windows Server 2022 Benchmark v1.0.0CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 NG MSWindows
CIS_Microsoft_Windows_Server_2022_Stand-alone_v1.0.0_NG_MS.audit from CIS Microsoft Windows Server 2022 Stand-alone Benchmark v1.0.0CIS Microsoft Windows Server 2022 Stand-alone v1.0.0 NG MSWindows
CIS_Microsoft_Windows_Server_2025_Stand-alone_v1.0.0_L1_MS.audit from CIS Microsoft Windows Server 2025 Stand-alone v1.0.0CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 L1 MSWindows
CIS_Red_Hat_Enterprise_Linux_9_STIG_v1.0.0_CAT_I.audit from CIS Red Hat Enterprise Linux 9 STIG Benchmark v1.0.0CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IUnix
CIS_Red_Hat_Enterprise_Linux_9_STIG_v1.0.0_CAT_II.audit from CIS Red Hat Enterprise Linux 9 STIG Benchmark v1.0.0CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix
DTAM104 - McAfee VirusScan On-Access Scanner All Processes settings must be configured to find unknown unwanted programs and trojans.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM105 - McAfee VirusScan On-Access Default Processes Policies must be configured to find unknown macro viruses.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F exit=-EACCES'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F exit=-EACCES'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F exit=-EPERM'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F exit=-EPERM'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F success=0'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720 - The audit system must be configured to audit failed attempts to access files and programs - '-S creat -F success=0'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002720-2 - The audit system must be configured to audit failed attempts to access files and programs - '-S open -F success=0'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720-2 - The audit system must be configured to audit failed attempts to access files and programs - '-S open -F success=0'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002720-3 - The audit system must be configured to audit failed attempts to access files and programs - '-S openat -F exit=-EPERM'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720-3 - The audit system must be configured to audit failed attempts to access files and programs - '-S openat -F exit=-EPERM'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002720-3 - The audit system must be configured to audit failed attempts to access files and programs - '-S openat -F success=0'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720-4 - The audit system must be configured to audit failed attempts to access files and programs - '-S truncate -F exit=-EACCES'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN002720-4 - The audit system must be configured to audit failed attempts to access files and programs - '-S truncate -F success=0'DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

GEN002720-5 - The audit system must be configured to audit failed attempts to access files and programs - '-S ftruncate -F success=0'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

GEN008380 - A root kit check tool must be run on the system at least weekly.DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

HP ProCurve - 'Configure Management VLAN'TNS HP ProCurveHPProCurve

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

HP ProCurve - 'Disable Telnet'TNS HP ProCurveHPProCurve

CONFIGURATION MANAGEMENT

HP ProCurve - 'Enable ARP protection'TNS HP ProCurveHPProCurve

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000012 - To protect against unauthorized data mining, the Juniper Networks SRX Series Gateway IDPS must prevent code injection attacks launched against application objects, including, at a minimum, application URLs and application code.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

ACCESS CONTROL

JUSX-IP-000023 - The IDPS must send an alert to, at a minimum, the ISSO and ISSM when intrusion detection events are detected that indicate a compromise or potential for compromise.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000051 - The Palo Alto Networks security platform must send an alert to, at a minimum, the ISSO and ISSM when intrusion detection events are detected which indicate a compromise or potential for compromise.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Certs - Untrusted CATNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect MD5 DigestTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect Self-signed certsTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect Weak Ciphers (<64 bits)TNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010112 - The Ubuntu operating system must allow the use of a temporary password for system logons with an immediate change to a permanent password.DISA STIG Ubuntu 18.04 LTS v2r15Unix

IDENTIFICATION AND AUTHENTICATION