Item Search

NameAudit NamePluginCategory
1.1.4.4 system accountingCIS Cisco IOS XR 7.x v1.0.1 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.1.9 - MobileIron - Turn off Ask to Join NetworksMobileIron - CIS Apple iOS 8 v1.0.0 L2MDM

ACCESS CONTROL

1.28 WN10-00-000130CIS Microsoft Windows 10 STIG v1.0.0 CAT IIWindows

CONFIGURATION MANAGEMENT

2.5.4 Ensure Radius or TACACS+ server is configured - tacacs-servers state onCIS Check Point Firewall L1 v1.1.0CheckPoint

IDENTIFICATION AND AUTHENTICATION

2.6.2 Ensure auditlog is set to permanentCIS Check Point Firewall L1 v1.1.0CheckPoint

AUDIT AND ACCOUNTABILITY

3.4 Ensure Hit count is Enable for the rulesCIS Check Point Firewall L2 v1.1.0CheckPoint

SECURITY ASSESSMENT AND AUTHORIZATION

3.11 Ensure Drop Out of State ICMP Packets is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

SECURITY ASSESSMENT AND AUTHORIZATION

3.15 Ensure Accept Domain Name over TCP (Zone Transfer) is not enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

3.19 Ensure Automatic ARP Configuration NAT is enabledCIS Check Point Firewall L2 v1.1.0CheckPoint

CONFIGURATION MANAGEMENT

5.2.4 Ensure users must provide password for escalationCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

MEDIA PROTECTION

Allow Trusted Locations on the network - allownetworklocations - excelMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - excelMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - excelMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - ms projectMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - powerpointMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - projectMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - visioMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - visioMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - allownetworklocations - wordMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - excelMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - ms projectMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - ms projectMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - powerpointMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow Trusted Locations on the network - visioMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

CIS_Red_Hat_EL7_STIG_v2.0.0_L1_Workstation.audit from CIS Red Hat Enterprise Linux 7 STIG v2.0.0CIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L1_Server.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix
CIS_Red_Hat_Enterprise_Linux_7_v4.0.0_L2_Workstation.audit from CIS Red Hat Enterprise Linux 7 Benchmark v4.0.0CIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix
DTOO134 - Disallowance of trusted locations on the network must be enforced.DISA STIG Microsoft Excel 2016 v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO134 - Disallowance of trusted locations on the network must be enforced.DISA STIG Microsoft PowerPoint 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO134 - Disallowance of trusted locations on the network must be enforced.DISA STIG Microsoft Word 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

MSFT-11-001000 - Microsoft Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].MobileIron - DISA Microsoft Android 11 COPE v1r2MDM

CONFIGURATION MANAGEMENT

O365-PR-000001 - Trusted Locations on the network must be disabled in Project.DISA Microsoft Office 365 ProPlus STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000533 - The Red Hat Enterprise Linux operating system must have an anti-virus solution installed.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

RHEL-07-020010 - The Red Hat Enterprise Linux operating system must not have the ypserv package installed.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-021024 - The Red Hat Enterprise Linux operating system must mount /dev/shm with secure options.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-030360 - The Red Hat Enterprise Linux operating system must audit all executions of privileged functions.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-07-040520 - The Red Hat Enterprise Linux operating system must enable an application firewall, if available.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040820 - The Red Hat Enterprise Linux operating system must not have unauthorized IP tunnels configured.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SPLK-CL-000160 - Splunk Enterprise must be configured to send an immediate alert to the system administrator (SA) and information system security officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity - at a minimum when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.DISA STIG Splunk Enterprise 8.x for Linux v2r3 STIG REST APISplunk

AUDIT AND ACCOUNTABILITY

ZEBR-11-001000 - Zebra Android 11 must be configured to enforce an application installation policy by specifying an application allow list that restricts applications by the following characteristics: [selection: list of digital signatures, cryptographic hash values, names, application version].AirWatch - DISA Zebra Android 11 COBO STIG v1r4MDM

CONFIGURATION MANAGEMENT