Item Search

NameAudit NamePluginCategory
1.1.3 Ensure 'Maximum password age' is set to '60 or fewer days, but not 0' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION

1.2.1.8 Ensure 'Scripted Window Security Restrictions' is set to Enabled - excel.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.8 Ensure 'Scripted Window Security Restrictions' is set to Enabled - mspub.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.1.12 Ensure Samba is not installedCIS Debian Family Workstation L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.1.12 Ensure Samba is not installedCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.2.9 Disable Samba Support - Make sure that /network/samba is disabled. Note this check is only applicable for Solaris 10 >= 8/07CIS Solaris 10 L1 v5.2Unix
2.2.11 Ensure Samba is not installedCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

2.2.11 Ensure Samba is not installedCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.2.12 Ensure Samba is not enabledCIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT

2.2.12 Ensure Samba is not enabledCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

18.8.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.8.5.3 Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 DC NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.3.1 (L1) Ensure 'Include command line in process creation events' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

AUDIT AND ACCOUNTABILITY

18.9.5.3 (L1) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2025 v1.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2016 v3.0.0 NG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 (NG) Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2022 Stand-alone v1.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.3 Ensure 'Turn On Virtualization Based Security: Virtualization Based Protection of Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Windows Server 2022 STIG v2.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.5 (NG) Ensure 'Turn On Virtualization Based Security: Credential Guard Configuration' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 10 Stand-alone v4.0.0 NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.5 (NG) Ensure 'Turn On Virtualization Based Security: Credential Guard Configuration' is set to 'Enabled with UEFI lock'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.16.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.16.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.16.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.10.16.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

CONFIGURATION MANAGEMENT

18.10.16.8 (L1) Ensure 'Toggle user control over Insider builds' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.10.93.4.3 (L1) Ensure 'Select when Quality Updates are received' is set to 'Enabled: 0 days'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

34.3 (L2) Ensure 'Allow Windows Spotlight (User)' is set to 'Block'CIS Microsoft Intune for Windows 11 v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

90.1 (L1) Ensure 'Hypervisor Enforced Code Integrity' is set to 'Enabled with UEFI lock'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

Network access: Remotely accessible registry pathsMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry pathsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Set the default behavior for AutoRunMSCT Windows 10 v22H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows 11 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server v1909 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server 2016 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server 2019 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server v2004 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRunMSCT Windows Server 2022 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRun - NoAutorunMSCT Windows Server 2025 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Set the default behavior for AutoRun - NoAutorunMSCT Windows Server 2025 MS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Sign-in last interactive user automatically after a system-initiated restartMSCT Windows Server 2012 R2 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Sign-in last interactive user automatically after a system-initiated restartMSCT Windows Server 2016 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Sign-in last interactive user automatically after a system-initiated restartMSCT Windows Server 2016 MS v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Turn off Crash DetectionMSCT Windows 10 v1507 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 1803 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server v20H2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 10 v20H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn off Crash DetectionMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT