Item Search

NameAudit NamePluginCategory
1.1.1 - AirWatch - Update firmware to latest versionAirWatch - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.2 Apply Latest OS PatchesCIS Solaris 10 L1 v5.2Unix
2.1.1 (L1) Ensure 'Update policy override' is set to 'Enabled' with 'Always allow updates (recommended)' or 'Automatic silent updates' specifiedCIS Google Chrome L1 v3.0.0Windows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

2.5 Enable SSL for Network File copy (NFC)CIS VMware ESXi 5.1 v1.0.1 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

5.6.3 Ensure Control Plane Authorized Networks is EnabledCIS Google Kubernetes Engine (GKE) v1.7.0 L2GCP

ACCESS CONTROL, MEDIA PROTECTION

7.3 Enable Extension Block ListCIS Mozilla Firefox 38 ESR Windows L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

12.55 Passwords - 'Remove password parameters from configuration files utilized for Silent Installations'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows
18.9.7.1.1 (BL) Ensure 'Prevent installation of devices that match any of these device IDs' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BLWindows

MEDIA PROTECTION

18.9.7.1.1 (BL) Ensure 'Prevent installation of devices that match any of these device IDs' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NGWindows

MEDIA PROTECTION

18.9.7.1.1 (BL) Ensure 'Prevent installation of devices that match any of these device IDs' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

MEDIA PROTECTION

18.9.7.1.1 (BL) Ensure 'Prevent installation of devices that match any of these device IDs' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 BLWindows

MEDIA PROTECTION

18.9.7.1.11 (L1) Ensure 'Prevent installation of removable devices' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

MEDIA PROTECTION

DG0040-ORACLE11 - The DBMS software installation account should be restricted to authorized users - '$ORACLE_BASE owner, group and permissions are configured'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

CONFIGURATION MANAGEMENT

DG0040-ORACLE11 - The DBMS software installation account should be restricted to authorized users - '$ORACLE_HOME owner, group and permissions are configured'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

CONFIGURATION MANAGEMENT

DG0040-ORACLE11 - The DBMS software installation account should be restricted to authorized users - 'Oracle base directory file permissions are correct'DISA STIG Oracle 11 Installation v9r1 WindowsWindows

CONFIGURATION MANAGEMENT

DG0040-ORACLE11 - The DBMS software installation account should be restricted to authorized users - 'Oracle home directory file permissions are correct'DISA STIG Oracle 11 Installation v9r1 WindowsWindows

CONFIGURATION MANAGEMENT

DG0040-ORACLE11 - The DBMS software installation account should be restricted to authorized users - 'Oracle install account is disabled'DISA STIG Oracle 11 Installation v9r1 LinuxUnix

ACCESS CONTROL

DG0088-ORACLE11 - The DBMS should be periodically tested for vulnerability management and IA compliance.DISA STIG Oracle 11 Installation v9r1 WindowsWindows
DG0088-ORACLE11 - The DBMS should be periodically tested for vulnerability management and IA compliance.DISA STIG Oracle 11 Installation v9r1 LinuxUnix
DG0098-ORACLE11 - ccess to external objects should be disabled if not required and authorized - 'utl_file_dir does not include *'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB

CONFIGURATION MANAGEMENT

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

ESXI5-VM-000050 - The system must use templates to deploy VMs whenever possible.DISA STIG VMWare ESXi 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

FireEye - A scheduled system backup job is configuredTNS FireEyeFireEye

CONTINGENCY PLANNING

FireEye - AAA failed logins are trackedTNS FireEyeFireEye

ACCESS CONTROL

FireEye - AAA lockout settings apply to the 'admin' userTNS FireEyeFireEye

ACCESS CONTROL

FireEye - AAA lockouts are enabledTNS FireEyeFireEye

ACCESS CONTROL

FireEye - AAA lockouts occur after at most 5 failuresTNS FireEyeFireEye
FireEye - AAA user mapping defaultTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Boot image must be signedTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

FireEye - CLI commands do not hide any settings from administratorsTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Configuration auditing logs the required number of changesTNS FireEyeFireEye

CONFIGURATION MANAGEMENT

FireEye - Local logging retention configurationTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - NTP is enabledTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - Reports are run on a scheduleTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

FireEye - SNMP is enabledTNS FireEyeFireEye
FireEye - SNMP traps use a secure community stringTNS FireEyeFireEye

IDENTIFICATION AND AUTHENTICATION

FireEye - SNMP v3 users have passwordsTNS FireEyeFireEye

ACCESS CONTROL

FireEye - SNMP v3 uses AES instead of DESTNS FireEyeFireEye

ACCESS CONTROL

FireEye - System events are emailed to administratorsTNS FireEyeFireEye

SYSTEM AND INFORMATION INTEGRITY

FireEye - The appliance uses a trusted DNS serverTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - User connections are limited by subnet or VLANTNS FireEyeFireEye

SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - Web users are logged out after 20 minutes of inactivity or lessTNS FireEyeFireEye

ACCESS CONTROL

OH12-1X-000208 - A production OHS Installation must prohibit the installation of a compiler.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020190 - The operating system must employ automated mechanisms, per organization-defined frequency, to detect the addition of unauthorized components/devices into the operating system.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000130 - Splunk Enterprise must be configured to retain the DoD-defined attributes of the log records sent by the devices and hosts.DISA STIG Splunk Enterprise 8.x for Linux v2r1 STIG REST APISplunk

AUDIT AND ACCOUNTABILITY

VMCH-06-000043 - The system must use templates to deploy VMs whenever possible.DISA STIG VMware vSphere Virtual Machine 6.x v1r1VMware

CONFIGURATION MANAGEMENT

VMCH-65-000042 - System administrators must use templates to deploy virtual machines whenever possible.DISA STIG VMware vSphere Virtual Machine 6.5 v2r2VMware

CONFIGURATION MANAGEMENT

VMCH-67-000020 - System administrators must use templates to deploy virtual machines whenever possible.DISA STIG VMware vSphere 6.7 Virtual Machine v1r3VMware

CONFIGURATION MANAGEMENT

VMCH-70-000020 - System administrators must use templates to deploy virtual machines (VMs) whenever possible.DISA STIG VMware vSphere 7.0 Virtual Machine v1r4VMware

CONFIGURATION MANAGEMENT