Item Search

NameAudit NamePluginCategory
1.2.10 Set 'transport input none' for 'line aux 0'CIS Cisco IOS 12 L1 v4.0.0Cisco

CONFIGURATION MANAGEMENT

1.2.11 Set 'transport input none' for 'line aux 0'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.5.1 (L1) Ensure 'Configure Edge Website Typo Protection' is set to 'Enabled'CIS Microsoft Edge v3.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

1.6.1 Disable Telnet AccessCIS Cisco IOS XR 7.x v1.0.1 L1Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.9.1 Ensure 'Enable Gamer Mode' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.11.2 (L1) Ensure 'Guided Switch Enabled' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.17.1 (L1) Ensure 'Enable saving passwords to the password manager' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.33 (L1) Ensure 'Allow importing of autofill form data' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.91 (L2) Ensure 'Enable Drop feature in Microsoft Edge' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L2Windows

CONFIGURATION MANAGEMENT

1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.101 (L1) Ensure 'Enable tab organization suggestions' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.134 (L1) Ensure 'Wallet Donation Enabled' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

2.1.6 (L1) Ensure Exchange Online Spam Policies are set to notify administratorsCIS Microsoft 365 Foundations v5.0.0 L1 E5microsoft_azure

INCIDENT RESPONSE

2.5.14.3.19 (L1) Ensure 'Enable RPC encryption' is set to 'Enabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Enable Auditing of Incoming Network ConnectionsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

4.2.11 Ensure sshd KexAlgorithms is configuredCIS Ubuntu Linux 18.04 LTS v2.2.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2.12 Ensure sshd KexAlgorithms is configuredCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.4 Enable Auditing of Process and Privilege EventsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

5.1.1 Ensure 'sslEnabled' is set to 'true' within the CSIv2 Transport LayerCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Ensure sshd KexAlgorithms is configuredCIS Red Hat Enterprise Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.5 Ensure sshd KexAlgorithms is configuredCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.1 Ensure 'sslEnabled' is set to 'true' within the CSIv2 TransportLayer - needsReview/ZechCIS IBM WebSphere Liberty v1.0.0 L1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Debian 8 Server L1 v2.0.2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - approved algorithmsCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.16 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 16.04 LTS Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.3.18 Ensure only strong Key Exchange algorithms are used - approved algorithmsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.18 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.3 (L1) Ensure email from external senders is identifiedCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

CONFIGURATION MANAGEMENT

7.11 Ensure HTTP Strict Transport Security Is EnabledCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

Authentication with Exchange ServerMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Authentication with Exchange ServerMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Authentication with Exchange ServerMSCT M365 Apps for enterprise 2412 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000010 - The Cisco router must be configured to limit the number of concurrent management sessions to an organization-defined number.DISA Cisco IOS XE Router NDM STIG v3r4Cisco

ACCESS CONTROL

CISC-ND-000010 - The Cisco router must be configured to limit the number of concurrent management sessions to an organization-defined number.DISA Cisco IOS Router NDM STIG v3r4Cisco

ACCESS CONTROL

CISC-RT-000230 - The Cisco router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

ACCESS CONTROL

CISC-RT-000230 - The Cisco router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA Cisco IOS Router RTR STIG v3r3Cisco

ACCESS CONTROL

CISC-RT-000230 - The Cisco switch must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA STIG Cisco IOS Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000230 - The Cisco switch must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

ACCESS CONTROL

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.DISA Cisco IOS Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter router must be configured to drop IPv6 undetermined transport packets.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000392 - The Cisco perimeter switch must be configured to drop IPv6 undetermined transport packets.DISA STIG Cisco IOS XE Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

Dont allow Dynamic Data Exchange (DDE) server launch in ExcelMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

EDGE-00-000001 - User control of proxy settings must be disabled.DISA STIG Edge v2r2Windows

ACCESS CONTROL

EDGE-00-000006 - Background processing must be disabled.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

EDGE-00-000068 - FriendlyURLs must be disabled.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

JUEX-RT-000950 - The Juniper PE router providing MPLS Virtual Private Wire Service (VPWS) must be configured to have the appropriate virtual circuit identification (VC ID) for each attachment circuit.DISA Juniper EX Series Router v2r1Juniper

CONFIGURATION MANAGEMENT

JUSX-DM-000150 - For nonlocal maintenance sessions using SSH, the Juniper SRX Services Gateway must securely configured SSHv2 with privacy options to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.DISA Juniper SRX Services Gateway NDM v3r2Juniper

MAINTENANCE

Minimum TLS version enabledMSCT Edge v98 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabledMSCT Edge v107 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION