Item Search

NameAudit NamePluginCategory
1.12 Ensure there is only one active access key for any single IAM userCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

1.15 Ensure all Public Web Tier SSL\TLS certificates are >30 days from ExpirationCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws

SYSTEM AND INFORMATION INTEGRITY

1.18 Ensure that all expired SSL/TLS certificates stored in AWS IAM are removedCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

6.2 Ensure the server is physically secureCIS Sybase 15.0 L2 DB v1.1.0SybaseDB
Citrix ADC - ARP - SpoofingTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

CONFIGURATION MANAGEMENT

Citrix ADC - NTP - AuthenticationTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADC - NTP - Servers countTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADC - NTP - SynchronizationTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADC - SNMP - Community namesTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADC - System Parameters - Allow Default PartitionTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADC - System Parameters - CLI Log LevelTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADC - System Parameters - FIPS modeTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADC - System Parameters - Force Password Change (nsroot)Tenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADC - System Parameters - Idle Session TimeoutTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADC - System Parameters - Local AuthenticationTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADC - System Parameters - Minimum Password LengthTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADC - System Parameters - Strong PasswordTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADM - NTP - Servers countTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADM - NTP - SynchronizationTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADM - SSL - Settings - SSL v3Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - SSL - Settings - TLS v1Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - SSL - Settings - TLSv1.1Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - SSL - Settings - TLSv1.2Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - Syslog - Configure serverTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADM - System Settings - Disable Shell access for non-nsroot UserTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

CONFIGURATION MANAGEMENT

Citrix ADM - System Settings - Enable Session TimeoutTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADM - System Settings - Session TimeoutTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADM - User Administration - Password Policy - Enable User LockoutTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADM - User Administration - Password Policy - Invalid Login AttemptsTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADM - User Administration - Password Policy - Minimum LengthTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADM - User Administration - Password Policy - Password ComplexityTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADM - User Administration - Password Policy - User Lockout Interval (Seconds)Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Configuring cookie encryption within the HTTP profileTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Configuring the BIG-IP system to enforce the use of strict passwordsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Disabling the admin accountTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

EX13-EG-003016 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX13-MB-003031 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000550 - Exchange must have antispam filtering configured.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000550 - Exchange must have antispam filtering configured.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000730 - The application must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000730 - The application must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000760 - The application must be configured to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000760 - The application must be configured to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX19-ED-000142 - Exchange must have anti-spam filtering configured.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

Overview of Appliance modeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Overview of port lockdown behaviorTenable F5 BIG-IP Best Practice AuditF5

CONFIGURATION MANAGEMENT

Preserving or modifying HTTP response headers removed by the BIG-IP ASM systemTenable F5 BIG-IP Best Practice AuditF5

SYSTEM AND COMMUNICATIONS PROTECTION

Tenable_Best_Practices_F5_BIG-IP_v1.0.0.audit from K53108777: Hardening your F5 systemTenable F5 BIG-IP Best Practice AuditF5