2.2.39 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' (MS only) | CIS Microsoft Windows Server 2016 v3.0.0 L1 MS | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
3.124 - Audit of Backup and Restore Privileges is not turned off. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.4.4 (L1) Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v4.0.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
4.4.4 (L1) Ensure 'Enable Structured Exception Handling Overwrite Protection (SEHOP)' is set to 'Enabled' | CIS Microsoft Intune for Windows 11 v4.0.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
5.4 Ensure a Separate Timestamp Is Enabled for Each User/tty Combo | CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1 | Unix | ACCESS CONTROL |
5.4 Ensure a Separate Timestamp Is Enabled for Each User/tty Combo | CIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1 | Unix | ACCESS CONTROL |
5.4 Ensure a Separate Timestamp Is Enabled for Each User/tty Combo | CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1 | Unix | ACCESS CONTROL |
5.5 Ensure a Separate Timestamp Is Enabled for Each User/tty Combo | CIS Apple macOS 13.0 Ventura v3.1.0 L1 | Unix | ACCESS CONTROL |
17.1.2 Ensure 'Audit Kerberos Authentication Service' is set to 'Success and Failure' (DC Only) | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DC | Windows | AUDIT AND ACCOUNTABILITY |
17.9.3 Ensure 'Audit System Integrity' is set to 'Success and Failure' - Success and Failure | CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MS | Windows | AUDIT AND ACCOUNTABILITY |
18.3.7 Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.7 (L1) Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLocker | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
18.4.8 (L1) Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
18.4.8 (L1) Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NG | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
18.4.8 (L1) Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NG | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
18.4.8 Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain Controller | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
18.4.9 Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
18.4.10 (L1) Ensure 'WDigest Authentication' is set to 'Disabled' | CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1 | Windows | IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
DTAM101 - McAfee VirusScan On-Access Scanner All Processes settings must be configured to scan when writing to disk. | DISA McAfee VirusScan 8.8 Local Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAM102 - McAfee VirusScan On-Access Default Processes Policies must be configured to scan when reading from disk. | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTOO315 - Outlook - Outlook must be configured not to prompt users to choose security settings if default settings fail. | DISA STIG Office 2010 Outlook v1r14 | Windows | CONFIGURATION MANAGEMENT |
Manage auditing and security log | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 v21H2 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 1903 MS v1.19.9 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 1909 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 1903 v1.19.9 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server v1909 MS v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2019 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 11 v24H2 v1.0.0 | Windows | ACCESS CONTROL |
Manage auditing and security log | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
SPLK-CL-000360 - Splunk Enterprise must be configured to enforce password complexity by requiring that at least one numeric character be used. | DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG OS | Unix | IDENTIFICATION AND AUTHENTICATION |
SPLK-CL-000410 - Splunk Enterprise must be configured to prohibit password reuse for a minimum of five generations. | DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG OS | Unix | IDENTIFICATION AND AUTHENTICATION |
WN11-AU-000585 - Windows 11 must have command line process auditing events enabled for failures. | DISA Microsoft Windows 11 STIG v2r3 | Windows | ACCESS CONTROL |
WN12-AU-000085 - The system must be configured to audit Policy Change - Audit Policy Change successes. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | AUDIT AND ACCOUNTABILITY |
WN12-AU-000086 - The system must be configured to audit Policy Change - Audit Policy Change failures. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
WN12-SO-000008 - Auditing of Backup and Restore Privileges must be turned off. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
WN16-AU-000310 - Windows Server 2016 must be configured to audit Policy Change - Audit Policy Change successes. | DISA Microsoft Windows Server 2016 STIG v2r10 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
WN19-AU-000270 - Windows Server 2019 must be configured to audit Policy Change - Audit Policy Change failures. | DISA Microsoft Windows Server 2019 STIG v3r4 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |