Item Search

NameAudit NamePluginCategory
1.4.2 Ensure 'Default file format' is set to Enabled (Access 2007)CIS Microsoft Office Access 2013 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.135 (L2) Ensure 'Enable QR Code Generator' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L2Windows

CONFIGURATION MANAGEMENT

2.1.4.1 (L1) Ensure 'Default file format' is set to 'Enabled: Access 2007'CIS Microsoft Intune for Office v1.1.0 L1Windows

CONFIGURATION MANAGEMENT

2.2.4.7.2.1.3 (L1) Ensure 'Don't allow Dynamic Data Exchange (DDE) server lookup in Excel' is set to 'Enabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.4.3 Ensure 'Receive connector' is set to 'TLS'CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.11 Ensure sshd KexAlgorithms is configuredCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.11 Ensure sshd KexAlgorithms is configuredCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.12 Ensure sshd KexAlgorithms is configuredCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.12 Ensure sshd KexAlgorithms is configuredCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.15 Ensure only strong Key Exchange algorithms are usedCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Enable Auditing of File Metadata Modification EventsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.9 Enable Kernel Level Auditing - Check audit policies is set to arge,argv,cntCIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

4.9 Enable Kernel Level Auditing, Check if 'flags:lo,ad,cc' is set in /etc/security/audit_control.CIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

4.9 Enable Kernel Level Auditing, Check if 'minfree:20' is set in /etc/security/audit_control.CIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

4.9 Enable Kernel Level Auditing, Check if 'naflags:lo,ad,ex' is set in /etc/security/audit_control.CIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

4.9 Enable Kernel Level Auditing, Check if 'root:lo,ad:no' is set in /etc/security/audit_user.CIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

5.1.5 Ensure sshd KexAlgorithms is configuredCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Ensure sshd KexAlgorithms is configuredCIS SUSE Linux Enterprise 15 v2.0.1 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Ensure sshd KexAlgorithms is configuredCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.12 Ensure sshd KexAlgorithms is configuredCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.12 Ensure sshd KexAlgorithms is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.12 Ensure sshd KexAlgorithms is configuredCIS Debian Linux 11 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.12 Ensure sshd KexAlgorithms is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.12 Ensure sshd KexAlgorithms is configuredCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong Key Exchange algorithms are usedCIS Debian Family Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong Key Exchange algorithms are usedCIS Debian Family Server L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Fedora 19 Family Linux Workstation L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3 Ensure AWS Cloudfront Logging is enabledCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

AUDIT AND ACCOUNTABILITY

5.3.16 Ensure only strong Key Exchange algorithms are used - sshdCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshdCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshdCIS Oracle Linux 6 Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshdCIS CentOS 6 Workstation L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshd_configCIS Oracle Linux 6 Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshd_configCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshd_configCIS CentOS 6 Server L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - sshd_configCIS CentOS 6 Workstation L1 v3.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.1.1 Configure SSH - Check if Host * is set in /etc/ssh/ssh_config.CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

6.4 Ensure Geo-Restriction is enabled within Cloudfront DistributionCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

6.10.1.10 Ensure Only Suite B Key Exchange Methods are set for SSH - weak key-exchangeCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION

Allow user-level native messaging hosts (installed without admin permissions)MSCT Edge v128 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)MSCT Microsoft Edge Version 81 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)MSCT Edge v86 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)MSCT Edge v87 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)MSCT Edge v133 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)MSCT Edge v136 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow user-level native messaging hosts (installed without admin permissions)MSCT Edge v137 v1.0.0Windows

CONFIGURATION MANAGEMENT

Dont allow Dynamic Data Exchange (DDE) server launch in ExcelMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Dont allow Dynamic Data Exchange (DDE) server lookup in ExcelMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Dont allow Dynamic Data Exchange (DDE) server lookup in ExcelMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EDGE-00-000034 - Edge development tools must be disabled.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT