Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 2 of 73
• 3645 Total
Next
Next ››
Name
Audit Name
Plugin
Category
2.1 Secure DB2 Runtime Library
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
2.1 Secure DB2 Runtime Library
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
2.1 Secure the DB2 Runtime Library
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
2.2 Secure the database container directory
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
3.1 Restrict Core Dumps to Protected Directory - /var/share/cores
CIS Solaris 11.2 L1 v1.1.0
Unix
3.1.5 Secure permissions for default database file path
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1.7 Secure permissions for all diagnostic logs
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
3.1.9 Require instance name for discovery requests
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.13 Retain fenced model processes
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS Permissions
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS Permissions
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
3.1.19 Secure permissions for the tertiary archive log location - FAILARCHPATH OS Permissions
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
3.1.20 Secure permissions for the log mirror location - MIRROLOGPATH OS Permission
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
3.2.1 Set failed archive retry delay
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.2.2 Set the database instance to auto-restart after abnormal termination
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.2.2 SSL service name - ssl_svcename
CIS IBM DB2 v10 v1.1.0 Database Level 2
IBM_DB2DB
3.2.3 Disable database discovery
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.2.6 Secure permissions for the tertiary archive log location - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
3.2.9 Set archive log failover retry limit
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
3.3.5 Secure the JDK 32-bit runtime library - FILE_PERMISSIONS
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS Windows
Windows
3.4 Control access to audit records - /etc/security/audit_control
CIS Apple macOS 10.12 L1 v1.2.0
Unix
3.15 Verify that /etc/docker directory ownership is set to root:root
CIS Docker 1.6 v1.0.0 L1 Docker
Unix
3.16 Verify that /etc/docker directory permissions are set to 755 or more restrictive
CIS Docker 1.6 v1.0.0 L1 Docker
Unix
5.3 Enable automatic database maintenance
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 DB
IBM_DB2DB
5.3 Enable automatic database maintenance
CIS IBM DB2 9 Benchmark v3.0.1 Level 2 DB
IBM_DB2DB
7.5 Change Home Directory for root Account - Check /root permissions.
CIS Solaris 10 L1 v5.2
Unix
8 - Management IP - .htacess exists
TNS Best Practice Jetty 9 Linux
Unix
8.8 Secure the permissions of the SSLconfig.ini file
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Windows
Windows
8.8 Secure the permissions of the SSLconfig.ini file
CIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS Linux
Unix
9.6 Secure the permission of the IBMLDAPSecurity.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
9.6 Secure the permission of the IBMLDAPSecurity.ini file
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Linux OS Level 1
Unix
9.7 Secure the permission of the SSLconfig.ini file
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.8 Check User Dot File Permissions. Please audit the results of this check and take action in accordance with corporate policy.
CIS Solaris 10 L1 v5.2
Unix
9.9 Secure plug-in library locations - group
CIS IBM DB2 v10 v1.1.0 Windows OS Level 1
Windows
9.9 Secure plug-in library locations - group
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.9 Secure plug-in library locations - server
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Windows OS Level 2
Windows
9.11 Ensure permissions on communication exit library locations
CIS IBM DB2 v10 v1.1.0 Linux OS Level 2
Unix
10.1 Enable process accounting at boot time
CIS Solaris 10 L2 v5.2
Unix
11.6 Samba: Set Secure smb.conf File Options - permissions
CIS Solaris 10 L2 v5.2
Unix
11.7 sendmail: Set Secure Logfile Ownership to the root User
CIS Solaris 10 L2 v5.2
Unix
Configuration files should be secured against unauthorized access.
TNS IBM HTTP Server Best Practice Middleware
Unix
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice
Windows
File permissions in the root document should only be accessible by administrator
TNS IBM HTTP Server Best Practice Middleware
Unix
XenServer - Use a static IP on the storage network interface
TNS Citrix XenServer
Unix
‹‹ Previous
Previous
Page 2 of 73
• 3645 Total
Next
Next ››