Item Search

NameAudit NamePluginCategory
1.41 WN19-00-000410CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows

CONFIGURATION MANAGEMENT

2.10 Ensure Unnecessary SQL Server Protocols are set to 'Disabled'CIS SQL Server 2012 Database L1 OS v1.6.0Windows

SYSTEM AND INFORMATION INTEGRITY

2.11 Use authorization pluginCIS Docker 1.12.0 v1.0.0 L2 DockerUnix

IDENTIFICATION AND AUTHENTICATION

2.11 Use authorization pluginCIS Docker 1.11.0 v1.0.0 L2 DockerUnix

IDENTIFICATION AND AUTHENTICATION

2.15 Do not enable swarm mode, if not neededCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

5.1 Ensure swarm mode is not Enabled, if not neededCIS Docker v1.8.0 L1 OS LinuxUnix

CONFIGURATION MANAGEMENT

7.1 Ensure swarm mode is not Enabled, if not neededCIS Docker Community Edition v1.1.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

20.6 (L1) Ensure 'PowerShell 2.0 is not Installed'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

CASA-FW-000020 - The Cisco ASA must immediately use updates made to policy enforcement mechanisms such as firewall rules, security policies, and security zones.DISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

CASA-FW-000200 - The Cisco ASA must be configured to send log data of denied traffic to a central audit server for analysis - Logging HostDISA STIG Cisco ASA FW v2r1Cisco

CONFIGURATION MANAGEMENT

DKER-EE-001370 - log-opts on all Docker Engine - Enterprise nodes must be configured.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

AUDIT AND ACCOUNTABILITY

DKER-EE-002080 - Docker Enterprise exec commands must not be used with privileged option.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

DKER-EE-002090 - Docker Enterprise exec commands must not be used with the user option.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

FNFG-FW-000100 - The FortiGate firewall must send traffic log entries to a central audit server for management and configuration of the traffic log entries.DISA Fortigate Firewall STIG v1r3FortiGate

AUDIT AND ACCOUNTABILITY

GEN000241 - The system clock must be synchronized continuously, or at least daily - 'NTP daemon is started at boot'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN000241 - The system clock must be synchronized continuously.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

GEN000244 - The system must use time sources local to the enclave.DISA STIG for Oracle Linux 5 v2r1Unix

AUDIT AND ACCOUNTABILITY

GEN000244 - The system must use time sources local to the enclave.DISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN000244 - The system must use time sources local to the enclave.DISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN000244 - The system must use time sources local to the enclave.DISA STIG AIX 6.1 v1r14Unix

AUDIT AND ACCOUNTABILITY

GEN000244 - The system must use time sources that are local to the enclaveDISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

AUDIT AND ACCOUNTABILITY

JUSX-IP-000001 - The Juniper Networks SRX Series Gateway IDPS must provide audit record generation capability for detecting events based on implementation of policy filters, rules, and signatures.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

AUDIT AND ACCOUNTABILITY

Network Security - Set the source address for all route engine generated traffic - syslogJuniper Hardening JunOS 12 Devices ChecklistJuniper

AUDIT AND ACCOUNTABILITY

Tenable_Best_Practices_Citrix_ADC_v1.0.0.audit from Tenable Best PracticesTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery
VCPG-70-000018 - VMware Postgres must be configured to log to 'stderr'.DISA STIG VMware vSphere 7.0 PostgreSQL v1r2Unix

AUDIT AND ACCOUNTABILITY

VCSA-70-000280 - The vCenter server must be configured to send events to a central log server.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

AUDIT AND ACCOUNTABILITY

VCSA-80-000280 - The vCenter server must be configured to send events to a central log server.DISA VMware vSphere 8.0 vCenter STIG v2r3VMware

AUDIT AND ACCOUNTABILITY

Windows Compliance Policy - Encryption of data storage on deviceTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL

Windows Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Compliance Policy - Required password typeTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - AccountsTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Browser AutofillTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Browser Pop-upsTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Cloud-delivered protectionTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT

Windows Device Configuration - Device discoveryTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Device name modificationTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - DevicesTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - File Blocking LevelTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

Windows Device Configuration - GamingTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Internet sharingTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL

Windows Device Configuration - PasswordTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - PersonalizationTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Real-time monitoringTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT

Windows Device Configuration - Scan archive fileTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT

Windows Device Configuration - Scan incoming mail messagesTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT

Windows Device Configuration - SystemTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

WN16-00-000420 - Windows PowerShell 2.0 must not be installed.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN22-00-000410 - Windows Server 2022 must not have Windows PowerShell 2.0 installed.DISA Microsoft Windows Server 2022 STIG v2r5Windows

CONFIGURATION MANAGEMENT