Item Search

NameAudit NamePluginCategory
1.1.2 Enable 'aaa authentication login'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

3.5.2 Configure FCoE ZoningCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

5.9 (L1) Host must restrict access to a default or native VLAN on standard virtual switchesCIS VMware ESXi 8.0 v1.2.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2.1 Ensure that port groups are not configured to the value of the native VLANCIS VMware ESXi 5.1 v1.0.1 Level 1VMware
7.4 (L1) Ensure port groups are not configured to the value of the native VLANCIS VMware ESXi 7.0 v1.5.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure port groups are not configured to the value of the native VLANCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

SYSTEM AND INFORMATION INTEGRITY

7.4 Ensure port groups are not configured to the value of the native VLANCIS VMware ESXi 6.7 v1.3.0 Level 1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure that port groups are not configured to the value of the native VLANCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
7.5 (L1) Ensure port groups are not configured to VLAN values reserved by upstream physical switchesCIS VMware ESXi 7.0 v1.5.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

20.8 Ensure 'Active Directory Infrastructure object is configured with proper audit settings' (STIG DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

ARST-L2-000150 - The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-L2-000150 - The Arista MLS layer 2 switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Arista MLS EOS 4.x L2S v2r2Arista

CONFIGURATION MANAGEMENT

ARST-L2-000160 - The Arista MLS layer 2 switch must have all trunk links enabled statically.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

ARST-L2-000160 - The Arista MLS layer 2 switch must have all trunk links enabled statically.DISA STIG Arista MLS EOS 4.x L2S v2r2Arista

CONFIGURATION MANAGEMENT

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA STIG Arista MLS EOS 4.x L2S v2r2Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000150 - The Cisco switch must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.DISA STIG Cisco IOS Switch NDM v3r2Cisco

ACCESS CONTROL

CISC-ND-000150 - The Cisco switch must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.DISA Cisco IOS XE Switch NDM STIG v3r4Cisco

ACCESS CONTROL

CISC-ND-000570 - The Cisco switch must be configured to enforce password complexity by requiring that at least one uppercase character be used.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000580 - The Cisco switch must be configured to enforce password complexity by requiring that at least one lower-case character be used.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000590 - The Cisco switch must be configured to enforce password complexity by requiring that at least one numeric character be used.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-000600 - The Cisco switch must be configured to enforce password complexity by requiring that at least one special character be used.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-001030 - The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.DISA STIG Cisco IOS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001030 - The Cisco switch must be configured to synchronize its clock with the primary and secondary time sources using redundant authoritative time sources.DISA Cisco IOS XE Switch NDM STIG v3r4Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001050 - The Cisco switch must be configured to record time stamps for log records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).DISA Cisco NX OS Switch NDM STIG v3r3Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001260 - The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA STIG Cisco IOS Switch NDM v3r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001260 - The Cisco switch must be configured to generate audit records when successful/unsuccessful logon attempts occur.DISA Cisco IOS XE Switch NDM STIG v3r4Cisco

AUDIT AND ACCOUNTABILITY

CISC-RT-000235 - The Cisco switch must be configured to have Cisco Express Forwarding enabled.DISA STIG Cisco IOS Switch RTR v3r1Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000235 - The Cisco switch must be configured to have Cisco Express Forwarding enabled.DISA Cisco IOS XE Switch RTR STIG v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000370 - The Cisco perimeter switch must be configured to have Cisco Discovery Protocol (CDP) disabled on all external interfaces.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DISA_STIG_Crunchy_Data_PostgreSQL_v3r1_OS_Linux.audit from DISA Crunchy Data PostgreSQL v3r1 STIGDISA STIG Crunchy Data PostgreSQL OS v3r1Unix
DISA_STIG_Microsoft_Edge_v2r2.audit from DISA Microsoft Edge v2r2 STIGDISA STIG Edge v2r2Windows
DISA_STIG_Microsoft_OneDrive_v2r3.audit from DISA Microsoft OneDrive v2r3 STIGDISA STIG Microsoft OneDrive v2r3Windows
DISA_STIG_Microsoft_PowerPoint_2010_v1r11.audit from DISA Microsoft PowerPoint 2010 v1r11 STIGDISA STIG Office 2010 PowerPoint v1r11Windows
DISA_STIG_Microsoft_Word_2013_v1r7.audit from DISA Microsoft Word 2013 v1r7 STIGDISA STIG Microsoft Word 2013 v1r7Windows
DISA_STIG_Oracle_Database_11.2g_v2r5_Database.audit from DISA Oracle Database 11.2g v2r5 STIGDISA STIG Oracle 11.2g v2r5 DatabaseOracleDB
DISA_STIG_Oracle_Database_11.2g_v2r5_OS_Linux.audit from DISA Oracle Database 11.2g v2r5 STIGDISA STIG Oracle 11.2g v2r5 LinuxUnix
DISA_STIG_Oracle_Database_11.2g_v2r5_OS_Windows.audit from DISA Oracle Database 11.2g v2r5 STIGDISA STIG Oracle 11.2g v2r5 WindowsWindows
DISA_STIG_Oracle_Database_12c_v3r4_Database.audit from DISA Oracle Database 12c v3r4 STIGDISA STIG Oracle 12c v3r4 DatabaseOracleDB
DISA_STIG_Oracle_Database_12c_v3r4_OS_Linux.audit from DISA Oracle Database 12c v3r4 STIGDISA STIG Oracle 12c v3r4 LinuxUnix
DISA_STIG_Oracle_Database_12c_v3r4_OS_Windows.audit from DISA Oracle Database 12c v3r4 STIGDISA STIG Oracle 12c v3r4 WindowsWindows
DISA_STIG_Oracle_MySQL_8.0_v2r2_Database.audit from DISA Oracle MySQL 8.0 v2r2 STIGDISA Oracle MySQL 8.0 v2r2 DBMySQLDB
DISA_STIG_Oracle_MySQL_8.0_v2r2_OS_Linux.audit from DISA Oracle MySQL 8.0 v2r2 STIGDISA Oracle MySQL 8.0 v2r2 OS LinuxUnix
System Alias and Banners - Switch CLI BannerTenable Cisco ACICisco_ACI

ACCESS CONTROL

VCSA-70-000274 - The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000274 - The vCenter Server must not configure all port groups to virtual local area network (VLAN) values reserved by upstream physical switches.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCTR-67-000020 - The vCenter Server must not configure all port groups to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000020 - All port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000020 - The vCenter Server for Windows must not configure all port groups to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

vNetwork : no-native-vlan-1VMWare vSphere 5.X Hardening GuideVMware