Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Release Notes
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 73
• 3645 Total
Next
Next ››
Name
Audit Name
Plugin
Category
2.1 Secure DB2 Runtime Library
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
2.1 Secure the DB2 Runtime Library
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
2.2 Secure the database container directory
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
3.1 Restrict Core Dumps to Protected Directory - /var/share/cores
CIS Solaris 11.2 L1 v1.1.0
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/cores
CIS Solaris 11 L1 v1.1.0
Unix
3.1 Restrict Core Dumps to Protected Directory - /var/share/cores
CIS Solaris 11.1 L1 v1.0.0
Unix
3.1.5 Secure permissions for default database file path
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
3.1.7 Secure permissions for all diagnostic logs
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
3.1.9 Require instance name for discovery requests
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.12 Enable instance health monitoring
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.12 Enable instance health monitoring
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.13 Retain fenced model processes
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS Permissions
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.2 Restrict Core Dumps to Protected Directory - Check if permissions for /var/cores are OK.
CIS Solaris 10 L1 v5.2
Unix
3.2.1 Set failed archive retry delay
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.2.1 TCP/IP service name - svcename
CIS IBM DB2 v10 v1.1.0 Database Level 2
IBM_DB2DB
3.2.3 Disable database discovery
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.2.9 Set archive log failover retry limit
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.3.5 Secure the JDK 32-bit runtime library - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows
Windows
3.3.6 Secure the JDK 64-bit runtime library - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows
Windows
3.5 Control access to audit records - /etc/security/audit_control
CIS Apple macOS 10.13 L1 v1.1.0
Unix
3.16 Verify that /etc/docker directory permissions are set to 755 or more restrictive
CIS Docker 1.6 v1.0.0 L1 Docker
Unix
4.5 Enable Login Records - Check if permissions for /var/adm/loginlog are OK.
CIS Solaris 10 L1 v5.2
Unix
8 - Management IP - .htacess exists
TNS Best Practice Jetty 9 Linux
Unix
8.8 Secure the permissions of the SSLconfig.ini file
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
9.6 Secure the permission of the IBMLDAPSecurity.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.8 Check User Dot File Permissions. Please audit the results of this check and take action in accordance with corporate policy.
CIS Solaris 10 L1 v5.2
Unix
9.9 Secure plug-in library locations - client
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.9 Secure plug-in library locations - group
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.9 Secure plug-in library locations - server
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
10.1 Enable process accounting at boot time
CIS Solaris 10 L2 v5.2
Unix
11.4 Samba: Set Secure Permissions on smbpasswd File
CIS Solaris 10 L2 v5.2
Unix
11.6 Samba: Set Secure smb.conf File Options - permissions
CIS Solaris 10 L2 v5.2
Unix
11.7 sendmail: Set Secure Logfile Ownership to the root User
CIS Solaris 10 L2 v5.2
Unix
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice
Windows
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice
Unix
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice
Unix
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice
Windows
XenServer - All network interfaces are operating in full-duplex mode
TNS Citrix XenServer
Unix
XenServer - Host is enabled
TNS Citrix XenServer
Unix
XenServer - Use a static IP on the management network interface
TNS Citrix XenServer
Unix
XenServer - Use a static IP on the storage network interface
TNS Citrix XenServer
Unix
‹‹ Previous
Previous
Page 2 of 73
• 3645 Total
Next
Next ››