Item Search

NameAudit NamePluginCategory
1.1.1 Enable 'aaa new-model'CIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - HTTPCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - TelnetCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4.2.1 Ensure 'TACACS+/RADIUS' is configured correctly - protocolCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

1.8.8 Ensure users must authenticate users using MFA via a graphical user logonCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

1.10 Ensure required packages for multifactor authentication are installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-clientCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-clientCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-redone-clientCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.2 Ensure rsh client is not installed - rsh-redone-clientCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.4 Ensure telnet client is not installedCIS Debian 9 Server L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.4 Ensure telnet client is not installedCIS Debian 9 Workstation L1 v1.0.1Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.7.1 (L1) Ensure 'Interactive logon: Do not display last user name' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.7.5 (L1) Configure 'Interactive logon: Message text for users attempting to log on'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.7.6 (L1) Configure 'Interactive logon: Message title for users attempting to log on'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.3.10.1 Ensure 'Network access: Allow anonymous SID/Name translation' is set to 'Disabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

3.1.3 Forbid Dial in AccessCIS Juniper OS Benchmark v2.1.0 L2Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

5.4.9 Ensure multifactor authentication for access to privileged accounts - PAM.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.4.10 Ensure certificate status checking for PKI authenticationCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

6.10.1.5 Ensure Remote Root-Login is denied via SSHCIS Juniper OS Benchmark v2.1.0 L1Juniper

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

6.10.6 Ensure Telnet is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

6.10.7 Ensure Reverse Telnet is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND INFORMATION INTEGRITY

9.2.3 Verify No Legacy '+' Entries Exist in /etc/shadow File - + Entries Exist in /etc/shadow FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

9.2.4 Verify No Legacy '+' Entries Exist in /etc/group File - + Entries Exist in /etc/group FileCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

18.2.1 Ensure LAPS AdmPwd GPO Extension / CSE is installedCIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION

18.2.3 Ensure 'Enable Local Admin Password Management' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION

APPL-15-003020 - The macOS system must enforce smart card authentication.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Enforce multifactor authentication for network access to non-privileged accountsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Enforce multifactor authentication for network access to non-privileged accountsNIST macOS Catalina v1.5.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

DKER-EE-002180 - SAML integration must be enabled in Docker Enterprise.DISA STIG Docker Enterprise 2.x Linux/Unix UCP v2r2Unix

IDENTIFICATION AND AUTHENTICATION

EDGE-00-000062 - The built-in DNS client must be disabled.DISA STIG Edge v2r2Windows

IDENTIFICATION AND AUTHENTICATION

Ensure 'TACACS+/RADIUS' is configured correctly - protocolTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

ESXI-80-000052 - The ESXi host Secure Shell (SSH) daemon must ignore .rhosts files.DISA VMware vSphere 8.0 ESXi STIG v2r3Unix

IDENTIFICATION AND AUTHENTICATION

GOOG-13-007200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.AirWatch - DISA Google Android 13 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-007200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.MobileIron - DISA Google Android 13 COBO v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-007200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.AirWatch - DISA Google Android 13 COBO v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-13-007200 - Google Android 13 must be configured to disable trust agents - NOTE: This requirement is not applicable (NA) for specific biometric authentication factors included in the product's Common Criteria evaluation.MobileIron - DISA Google Android 13 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Root Login for SSHNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Enforce multifactor authentication for network access to non-privileged accountsNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Enforce multifactor authentication for network access to privileged accountsNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

OL09-00-002359 - OL 9 SSHD must accept public key authentication.DISA Oracle Linux 9 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400020 - Ubuntu 24.04 LTS must implement smart card logins for multifactor authentication for local and network access to privileged and nonprivileged accounts.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

UBTU-24-400030 - Ubuntu 24.04 LTS must implement smart card logins for multifactor authentication for local and network access to privileged and nonprivileged accounts over SSH.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

WN19-DC-000310 - Windows Server 2019 Active Directory user accounts, including administrators, must be configured to require the use of a Common Access Card (CAC), Personal Identity Verification (PIV)-compliant hardware token, or Alternate Logon Token (ALT) for user authentication.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000020 - Windows Server 2022 Kerberos user logon restrictions must be enforced.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000030 - Windows Server 2022 Kerberos service ticket maximum lifetime must be limited to 600 minutes or less.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000040 - Windows Server 2022 Kerberos user ticket lifetime must be limited to 10 hours or less.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000050 - Windows Server 2022 Kerberos policy user ticket renewal maximum lifetime must be limited to seven days or less.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-DC-000060 - Windows Server 2022 computer clock synchronization tolerance must be limited to five minutes or less.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION