Item Search

NameAudit NamePluginCategory
1.7.2 Disable iPXE (Pre-boot eXecution Environment)CIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.9.4 Ensure Read Write privileges are not configured for SNMPCIS Cisco NX-OS v1.2.0 L1Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

1.10 Use Dedicated "mgmt" Interface and VRF for Administrative FunctionsCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT, MAINTENANCE

2.1.1.2 Set version 2 for 'ip ssh version'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

CONFIGURATION MANAGEMENT

2.2.32 Ensure 'Deny log on locally' to include 'Guests' (STIG DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.2.45 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.2.46 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.1.2 Set 'ntp authentication-key'CIS Cisco IOS 15 L2 v4.1.1Cisco

AUDIT AND ACCOUNTABILITY

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.3.17.4 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop or Prompt for credentials on the secure desktop' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

3.2.4 Disable IP Directed Broadcasts on all Layer 3 InterfacesCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.2 Configure FCoE ZoningCIS Cisco NX-OS v1.2.0 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

6.1.17 Secure SETSESSIONUSER PrivilegeCIS IBM DB2 11 v1.1.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

7.2 (L1) Ensure the vSwitch MAC Address Change policy is set to rejectCIS VMware ESXi 7.0 v1.5.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

17.7.2 Ensure 'Audit Audit Policy Change' is set to include 'Success and Failure' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

17.7.3 Ensure 'Audit Audit Policy Change' is set to include 'Success and Failure' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

17.7.3 Ensure 'Audit Audit Policy Change' is set to include 'Success and Failure' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.75.2.2 Ensure 'Configure Windows Defender SmartScreen' is set to 'Enabled: Warn' or 'Enabled: Warn and prevent bypass' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

19.7.15.1.1 Ensure 'Turn off Preview Pane' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

19.7.15.1.1 Ensure 'Turn off Preview Pane' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

AMLS-NM-000280 - The Arista Multilayer Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources - NTP Server 1DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

AMLS-NM-000280 - The Arista Multilayer Switch must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources - NTP Server 2DISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

AMLS-NM-000370 - The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system - all loggingDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000370 - The Arista Multilayer Switch must generate audit records showing starting and ending time for administrator access to the system - trap loggingDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

AMLS-NM-000380 - The Arista Multilayer Switch must generate audit records when concurrent logons from different workstations occur - show loggingDISA STIG Arista MLS DCS-7000 Series NDM v1r4Arista

AUDIT AND ACCOUNTABILITY

APPNET0064 - .Net applications that invoke NetFx40_LegacySecurityPolicy must apply previous versions of .NET STIG guidance.DISA STIG for Microsoft Dot Net Framework 4.0 v2r6Windows

CONFIGURATION MANAGEMENT

ARST-L2-000090 - The Arista MLS layer 2 switch must have DHCP snooping for all user VLANs to validate DHCP messages from untrusted sources.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-000290 - The Cisco ASA must be configured to produce audit log records containing information to establish the source of events.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

Console Authentication RealmTenable Cisco ACICisco_ACI

ACCESS CONTROL

Default Authentication RealmTenable Cisco ACICisco_ACI

ACCESS CONTROL

GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

GEN000280 - Direct logins must not be permitted to shared, default, application, or utility accounts.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

IDENTIFICATION AND AUTHENTICATION

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group - roles=rootDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN000850 - The system must restrict the ability to switch to the root user to members of a defined group.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

JUEX-L2-000030 - The Juniper layer 2 switch must be configured to disable all dynamic VLAN registration protocols.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

PHTN-40-000223 The Photon operating system must not forward IPv4 or IPv6 source-routed packets.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000227 The Photon operating system must not send IPv4 Internet Control Message Protocol (ICMP) redirects.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

PHTN-40-000229 The Photon operating system must use a reverse-path filter for IPv4 network traffic.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

CONFIGURATION MANAGEMENT

Remote Location - ProtocolTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT

Switch identity profileArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

vCenter: vcenter-8.network-restrict-netflow-usageVMware vSphere Security Configuration and Hardening GuideVMware

CONFIGURATION MANAGEMENT

vNetwork : reject-forged-transmit - 'PortGroup'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-forged-transmit - 'vSwitch'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-forged-transmit-StandardSwitchVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-promiscuous-mode - 'portgroup'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-promiscuous-mode - 'vswitch'VMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-promiscuous-mode-StandardSwitchVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION