Item Search

NameAudit NamePluginCategory
6 - Run your Instance as non privileged userTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

11 - JSP RegenerationTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

14 - Restrict access to binaries directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - SSL Encryption - Modify WSDL AddressTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

19 - Restrict access to logging.properties - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Restrict access to server.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/examplesTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/ROOT/adminTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEnabledTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEngineTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Disable FTPTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Disable WEP security modeTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Enable FirewallTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Enable stateful inspection on firewallTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Encrypt passwordsTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Ensure discovery protocols such as LLDP are not enabled on public interfacesTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Firewall - Deny by Default ACLTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Secure Web Access - HTTPS enabledTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Set 'motd' BannerTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : SNMP 'PRIVATE' community string not usedTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : SNMPv3 is used with 'priv'TNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

CGI-BIN directory should be disabled. 'Directory'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Encryption protocols such as https should be usedTNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Extreme : Configure Remote SyslogTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

AUDIT AND ACCOUNTABILITY

HTTP TRACE method should be disabled. 'TraceEnable'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Huawei: Device clock = UTCTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Device clock disable DST adjustmentTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Enable SSHTNS Huawei VRP Best Practice AuditHuawei

SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: External Syslog server is configuredTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: HTTPS Server requires SSL policyTNS Huawei VRP Best Practice AuditHuawei

SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: Information Center is not disabled.TNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: NTP is enabledTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: Set appropriate 'shell' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: SNMP appropriate trap hostTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SNMP Community string != publicTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: SNMP is ConfiguredTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: User Interfaces Idle Timeout Less Than 5 MinutesTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Logging Directives should be restricted to authorized users. - 'LogLevel notice'TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY

MaxClients parameter value should be configured to appropriate value.TNS IBM HTTP Server Best PracticeWindows

SYSTEM AND COMMUNICATIONS PROTECTION

MaxKeepAliveRequests parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_autoindex'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_include'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_userdir'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

Non-Essential modules should be disabled. 'mod_userdir'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

User IDs which disclose the privileges associated with it, should not be created. 'nologin'TNS IBM HTTP Server Best PracticeUnix

ACCESS CONTROL

WatchGuard : DDoS Prevention - Distributed Denial-of-Service Prevention - Per Server QuotaTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : ICMP Error Handling - 'network-unreachable'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : IPS Logging Threat Level Critical - EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : NTP EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : SNMP Configuration - community string - 'private'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION