Item Search

NameAudit NamePluginCategory
1.2.1.8 Ensure 'Scripted Window Security Restrictions' is set to Enabled - onent.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.8 Ensure 'Scripted Window Security Restrictions' is set to Enabled - outlook.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.8 Ensure 'Scripted Window Security Restrictions' is set to Enabled - powerpnt.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.8 Ensure 'Scripted Window Security Restrictions' is set to Enabled - pptview.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.2.9 Disable Samba Support - Make sure that /etc/sfw/smb.conf does not exist. Note this check is only applicable for Solaris 10 >= 11/06CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Microsoft Windows Server 2022 v4.0.0 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.4 (L1) Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.11.4 Ensure 'Network security: Configure encryption types allowed for Kerberos' is set to 'AES128_HMAC_SHA1, AES256_HMAC_SHA1, Future encryption types'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.5.20.2 (L2) Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L2Windows

ACCESS CONTROL

18.5.20.2 Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.6.20.2 Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.6.20.2 Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled'CIS Microsoft Windows Server 2019 STIG v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.6.20.2 Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.6.20.2 Ensure 'Prohibit access of the Windows Connect Now wizards' is set to 'Enabled'CIS Microsoft Windows Server 2022 STIG v2.0.0 L2 Member ServerWindows

CONFIGURATION MANAGEMENT

18.9.5.3 (L1) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2022 v4.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2016 v3.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2019 STIG v3.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.16.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

20.62 Ensure 'Telnet Client is not installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

Set the default behavior for AutoRunMSCT Windows 11 v23H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows 10 v1507 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows 10 1903 v1.19.9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows 10 1909 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server 1903 DC v1.19.9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server 2019 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT MSCT Windows Server 2022 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Sign-in last interactive user automatically after a system-initiated restartMSCT Windows 10 v1507 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

This settings controls whether Network Protection is allowed to be configured into block or audit mode on Windows Server.MSCT Windows Server 2025 DC v1.0.0Windows
Turn off Crash DetectionMSCT Windows 11 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 11 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server 2022 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server v20H2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server 1903 DC v1.19.9Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server v1909 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off real-time protectionMSCT Windows Server v20H2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Turn off real-time protectionMSCT Windows 10 v20H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

WINER-000002 - The system must be configured to generate error reports.DISA Windows Vista STIG v6r41Windows

SYSTEM AND INFORMATION INTEGRITY

WN10-CC-000235 - Users must not be allowed to ignore Windows Defender SmartScreen filter warnings for unverified files in Microsoft Edge.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT