Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 73
• 3645 Total
Next
Next ››
Name
Audit Name
Plugin
Category
2.1 Secure DB2 Runtime Library
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
2.1 Secure the DB2 Runtime Library
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
2.1 Secure the DB2 Runtime Library
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
2.2 Secure the database container directory
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/share/cores
CIS Solaris 11.2 L1 v1.1.0
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/cores
CIS Solaris 11 L1 v1.1.0
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/share/cores
CIS Solaris 11.1 L1 v1.0.0
Unix
3.1.5 Secure permissions for default database file path
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
3.1.12 Enable instance health monitoring
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.12 Enable instance health monitoring
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.13 Retain fenced model processes
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.13 Retain fenced model processes
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS Permissions
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.2 Restrict Core Dumps to Protected Directory - Check if permissions for /var/cores are OK.
CIS Solaris 10 L1 v5.2
Unix
3.2.1 TCP/IP service name - svcename
CIS IBM DB2 v10 v1.1.0 Database Level 2
IBM_DB2DB
3.2.2 Set the database instance to auto-restart after abnormal termination
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.2.6 Secure permissions for the tertiary archive log location - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
3.3.5 Secure the JDK 32-bit runtime library - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows
Windows
3.3.6 Secure the JDK 64-bit runtime library - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows
Windows
3.5 Control access to audit records - /etc/security/audit_control
CIS Apple macOS 10.13 L1 v1.1.0
Unix
3.15 Verify that /etc/docker directory ownership is set to root:root
CIS Docker 1.6 v1.0.0 L1 Docker
Unix
3.16 Verify that /etc/docker directory permissions are set to 755 or more restrictive
CIS Docker 1.6 v1.0.0 L1 Docker
Unix
4.5 Enable Login Records - Check if permissions for /var/adm/loginlog are OK.
CIS Solaris 10 L1 v5.2
Unix
5.3 Enable automatic database maintenance
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
5.3 Enable automatic database maintenance
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
7.5 Change Home Directory for root Account - Check /root permissions.
CIS Solaris 10 L1 v5.2
Unix
8.8 Secure the permissions of the SSLconfig.ini file
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
9.6 Secure the permission of the IBMLDAPSecurity.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.9 Secure plug-in library locations - client
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.9 Secure plug-in library locations - group
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.9 Secure plug-in library locations - group
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
11.2 Samba: Set Secure Permissions on smb.conf File
CIS Solaris 10 L2 v5.2
Unix
11.4 Samba: Set Secure Permissions on smbpasswd File
CIS Solaris 10 L2 v5.2
Unix
11.6 Samba: Set Secure smb.conf File Options - group
CIS Solaris 10 L2 v5.2
Unix
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice Middleware
Unix
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice
Windows
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice
Unix
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice
Windows
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice Middleware
Unix
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice
Unix
XenServer - All network interfaces are operating in full-duplex mode
TNS Citrix XenServer
Unix
XenServer - Use a static IP on the storage network interface
TNS Citrix XenServer
Unix
‹‹ Previous
Previous
Page 2 of 73
• 3645 Total
Next
Next ››