7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log Analytics | CIS Microsoft Azure Foundations v4.0.0 L2 | microsoft_azure | SYSTEM AND INFORMATION INTEGRITY |
9.2.1 Ensure That Microsoft Defender for IoT Hub Is Set To 'On' | CIS Microsoft Azure Foundations v4.0.0 L2 | microsoft_azure | RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY |
ARST-L2-000020 - The Arista MLS layer 2 switch must uniquely identify all network-connected endpoint devices before establishing any connection. | DISA STIG Arista MLS EOS 4.2x L2S v2r1 | Arista | IDENTIFICATION AND AUTHENTICATION |
GEN006560 - The system vulnerability assessment, host-based intrusion detection, and file integrity tools must notify of a security breach. | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
Host version | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection. | DISA Juniper EX Series Layer 2 Switch v2r3 | Juniper | IDENTIFICATION AND AUTHENTICATION |
JUSX-IP-000005 - The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that rules are applied to outbound communications traffic. | DISA Juniper SRX Services Gateway IDPS v2r1 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
List bonded NIC groups | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List crash dumps | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List halted VMs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List networks | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List non-default VM templates | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List patches | TNS Citrix Hypervisor | Unix | SYSTEM AND INFORMATION INTEGRITY |
List physical storage locations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List running VMs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List users | TNS Citrix Hypervisor | Unix | ACCESS CONTROL |
List virtual disks | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List VLANs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List VM CPU allocations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
List VM memory allocations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
NTP client configured | TNS Citrix Hypervisor | Unix | AUDIT AND ACCOUNTABILITY |
Only allow access to required network services | TNS Citrix Hypervisor | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PANW-IP-000018 - The Palo Alto Networks security platform must have a denial-of-service (DoS) Protection Profile for outbound traffic applied to a policy for traffic originating from the internal zone going to the external zone. | DISA STIG Palo Alto IDPS v3r2 | Palo_Alto | SYSTEM AND COMMUNICATIONS PROTECTION |
PANW-IP-000055 - The Palo Alto Networks security platform must send an alert to, at a minimum, the ISSO and ISSM when denial of service incidents are detected. | DISA STIG Palo Alto IDPS v3r2 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
SLES-12-010500 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SUSE operating system configuration at least weekly. | DISA SLES 12 STIG v3r2 | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
SLES-15-040450 - The SUSE operating system SSH server must be configured to use only FIPS-validated key exchange algorithms. | DISA SUSE Linux Enterprise Server 15 STIG v2r4 | Unix | ACCESS CONTROL |
SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - Enabled | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | AUDIT AND ACCOUNTABILITY |
SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - Server | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | AUDIT AND ACCOUNTABILITY |
SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - Explicit | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - External | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
The hosts.allow file limits access to the local network | TNS Citrix Hypervisor | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
TNS_BestPractice_Citrix_Hypervisor.audit | TNS Citrix Hypervisor | Unix | |
UBTU-22-255060 - Ubuntu 22.04 LTS SSH server must be configured to use only FIPS-validated key exchange algorithms. | DISA Canonical Ubuntu 22.04 LTS STIG v2r4 | Unix | ACCESS CONTROL |
XenServer - Host version | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List crash dumps | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List halted VMs | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List networks | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List non-default VM templates | TNS Citrix XenServer | Unix | |
XenServer - List patches | TNS Citrix XenServer | Unix | SYSTEM AND INFORMATION INTEGRITY |
XenServer - List physical storage locations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List running VMs | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List security roles | TNS Citrix XenServer | Unix | ACCESS CONTROL |
XenServer - List users | TNS Citrix XenServer | Unix | ACCESS CONTROL |
XenServer - List virtual disks | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List VM CPU allocations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - List VM memory allocations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - Only allow access to required network services | TNS Citrix XenServer | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
XenServer - Review accounts used to mount remote storage | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
XenServer - The hosts.deny file blocks access by default | TNS Citrix XenServer | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
XenServer - XAPI SSL certificate is in default location | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |