Item Search

NameAudit NamePluginCategory
1.1.4 - AirWatch - Set Auto-lock - 'Inactivity Timeout <= 2'AirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.1.4 - AirWatch - Set Auto-lock - 'Inactivity Timeout <= 2'AirWatch - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.1.4 - MobileIron - Set Auto-lock - 'Inactivity Timeout <= 2'MobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

1.2 Enable SSH (Protocol 2)CIS FreeBSD v1.0.5Unix
1.9.1.3 Ensure 'trusted NTP server' existsCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.9.1.3 Ensure 'trusted NTP server' existsCIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

2. OpenStack Networking - Policy.json - 'shared_firewalls'TNS OpenStack Neutron/Networking Security GuideUnix

ACCESS CONTROL

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS 12 L1 v4.0.0Cisco

CONFIGURATION MANAGEMENT

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.11 listener.ora - 'Change standard ports'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

CONFIGURATION MANAGEMENT

5.1.4 Ensure SSH Protocol is set to 2CIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.2 Ensure SSH Protocol is set to 2CIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

5.2.2 Ensure SSH Protocol is set to 2CIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

CONFIGURATION MANAGEMENT

5.2.2 Ensure SSH Protocol is set to 2CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

CONFIGURATION MANAGEMENT

5.2.2 Ensure SSH Protocol is set to 2CIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

CONFIGURATION MANAGEMENT

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 8 Workstation L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 9 Workstation L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is set to 2CIS Distribution Independent Linux Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.4 Ensure SSH Protocol is set to 2CIS Debian 8 Server L1 v2.0.2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.4 Ensure SSH Protocol is set to 2CIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

5.3.29 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.10.1.2 Ensure SSH is Restricted to Version 2CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINALPHA = 2CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

9.1.1 Enable cron Daemon - anacron run level 2CIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.1.1 Enable cron Daemon - cron run level 2CIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows Server 2025 v1.0.0 L1 MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

18.6.7.4 (L1) Ensure 'Enable authentication rate limiter' is set to 'Enabled'CIS Microsoft Windows Server 2025 v1.0.0 L1 DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow users to demote attachments to Level 2MSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA STIG Arista MLS EOS 4.x L2S v2r3Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - sequential characters must be set to 2Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

DTBC-0055 - Download restrictions must be configured.DISA Google Chrome Current Windows STIG v2r11Windows

AUDIT AND ACCOUNTABILITY

GEN001375-ESXI5-000086 - For systems using DNS resolution, at least two name servers must be configured.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

IIST-SI-000223 - The IIS 10.0 website must generate unique session identifiers that cannot be reliably reproduced.DISA IIS 10.0 Site v2r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000228 - The Oracle Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

RHEL-07-040400 - The Red Hat Enterprise Linux operating system must be configured so that the SSH daemon is configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

Salesforce.com : Setting Session Security - 'Session Timeout <= 2 hours'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

SonicWALL - Review the NTP server configurationTNS SonicWALL v5.9SonicWALL

AUDIT AND ACCOUNTABILITY

Word 2 and earlier binary documents and templatesMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMSCT Office 2016 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Word 2 and earlier binary documents and templatesMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY