Item Search

NameAudit NamePluginCategory
1.35 (L1) Ensure 'Allow importing of home page settings' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.38 (L1) Ensure 'Allow importing of search engine settings' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.50 (L2) Ensure 'Allow users to open files using the DirectInvoke protocol' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L2Windows

CONFIGURATION MANAGEMENT

1.70 (L1) Ensure 'Configure the Share experience' is set to 'Enabled: Don't allow using the Share experience'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.84 (L1) Ensure 'Enable AutoFill for addresses' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.92 (L1) Ensure 'Enable Follow service in Microsoft Edge' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.97 (L1) Ensure 'Enable resolution of navigation errors using a web service' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

1.99 (L1) Ensure 'Enable security warnings for command-line flags' is set to 'Enabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

2.1.6 (L1) Ensure Exchange Online Spam Policies are set to notify administratorsCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

INCIDENT RESPONSE

2.2.4.7.2.1.3 Ensure 'Don't allow Dynamic Data Exchange (DDE) server lookup in Excel' is set to 'Enabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.34 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

ACCESS CONTROL

2.2.35 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.37 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.2.37 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.37 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.38 (L1) Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.49 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.49 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.50 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.50 Ensure 'Manage auditing and security log' is set to 'Administrators' and (when Exchange is running in the environment) 'Exchange Servers' (DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.5.14.3.19 (L1) Ensure 'Enable RPC encryption' is set to 'Enabled'CIS Microsoft Intune for Office v1.1.0 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.7.1 iCloud configurationCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
2.15 Limit Accepted Transport Layer Security (TLS) VersionsCIS Oracle MySQL Enterprise Edition 8.0 v1.4.0 L2 DatabaseMySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

2.15 Limit Accepted Transport Layer Security (TLS) VersionsCIS Oracle MySQL Enterprise Edition 8.4 v1.0.0 L2 MySQL RDBMSMySQLDB

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Enable Auditing of Incoming Network Connections - AUE_SOCKCONNECT : cisCIS Solaris 11.2 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

5.1.15 Ensure only strong Key Exchange algorithms are usedCIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Debian 9 Workstation L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are usedCIS Debian 9 Server L1 v1.0.1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - approved algorithmsCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - approved algorithmsCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 18.04 LXD Host L1 Server v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - weak algorithmsCIS Ubuntu Linux 18.04 LXD Host L1 Workstation v1.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

5.2.15 Ensure only strong Key Exchange algorithms are used - weak Key Exchange algorithmsCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CIS VMware ESXi 5.5 v1.2.0 Level 1CIS VMware ESXi 5.5 v1.2.0 Level 1VMware
CISC-RT-000392 - The Cisco perimeter switch must be configured to drop IPv6 undetermined transport packets.DISA STIG Cisco IOS Switch RTR v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Publisher - Links that invoke instances of IE from within an Office product must be blocked.DISA STIG Office 2010 Publisher v1r12Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO280 - Outlook - Authentication with Exchange Server must be required.DISA STIG Office 2010 Outlook v1r14Windows

IDENTIFICATION AND AUTHENTICATION

DTOO280 - Outlook must be configured to force authentication when connecting to an Exchange server.DISA STIG Microsoft Outlook 2016 v2r3Windows

IDENTIFICATION AND AUTHENTICATION

Dynamic Data ExchangeMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Dynamic Data ExchangeMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Dynamic Data ExchangeMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

EDGE-00-000009 - The default search provider must be set to use an encrypted connection.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

EDGE-00-000045 - The version of Microsoft Edge running on the system must be a supported version.DISA STIG Edge v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

FireEye - Reports are run on a scheduleTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

Minimum TLS version enabledMSCT Microsoft Edge Version 80 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabledMSCT Microsoft Edge Version 83 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabledMSCT Edge v84 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabled (deprecated)MSCT edge v96 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000250 - The Windows Defender SmartScreen filter for Microsoft Edge must be enabled.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT