Item Search

NameAudit NamePluginCategory
1.3 Account Anti-riot AttackTenable ZTE ROSNGZTE_ROSNG

ACCESS CONTROL

1.6 Support Web Access Security - c) versionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - a) Disable encryption noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

3.3 Authentication and Verification of BGP Routing ProtocolsTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

Adtran : Disable SSLv2TNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable NTPTNS Adtran AOS Best Practice AuditAdtran
Adtran : Enable service password-encryptionTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Encrypt enable passwordTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Ensure DHCP is Disabled unless neededTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Ensure the log level is set at an appropriate settingTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Adtran : SNMP 'PUBLIC' community string not usedTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

F5BI-AS-000163 - To protect against data mining, The BIG-IP ASM module must be configured to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r2F5

ACCESS CONTROL

F5BI-LT-000163 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

ACCESS CONTROL

GEN006560 - The system vulnerability assessment tool, host-based intrusion detection tool, and file integrity tool must notify SA and IAO.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Host versionTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-IP-000017 - The Juniper Networks SRX Series Gateway IDPS must protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000025 - The IDPS must send an alert to, at a minimum, the ISSO and ISSM when DoS incidents are detected.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

List crash dumpsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List halted VMsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List non-default VM templatesTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List running VMsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List security rolesTNS Citrix HypervisorUnix

ACCESS CONTROL

List virtual disksTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VLANsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM CPU allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM memory allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

NTP client configuredTNS Citrix HypervisorUnix

AUDIT AND ACCOUNTABILITY

PANW-IP-000024 - The Palo Alto Networks security platform must install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.DISA STIG Palo Alto IDPS v3r1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

Review accounts used to mount remote storageTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

RHEL-09-651035 - RHEL 9 must be configured so that the file integrity tool verifies extended attributes.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - FromDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

SYMP-AG-000230 - Symantec ProxySG must provide an alert to, at a minimum, the SCA and ISSO of all audit failure events where the detection and/or prevention function is unable to write events to either local storage or the centralized server - ServerDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

AUDIT AND ACCOUNTABILITY

The hosts.deny file blocks access by defaultTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

TNS_BestPractice_Citrix_Hypervisor.auditTNS Citrix HypervisorUnix
XAPI SSL certificate is in default locationTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

XenServer - List bonded NIC groupsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List crash dumpsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List halted VMsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List non-default VM templatesTNS Citrix XenServerUnix
XenServer - List patchesTNS Citrix XenServerUnix

SYSTEM AND INFORMATION INTEGRITY

XenServer - List security rolesTNS Citrix XenServerUnix

ACCESS CONTROL

XenServer - List usersTNS Citrix XenServerUnix

ACCESS CONTROL

XenServer - List virtual disksTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VLANsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VM CPU allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VM memory allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - NTP client configuredTNS Citrix XenServerUnix

AUDIT AND ACCOUNTABILITY

XenServer - Review accounts used to mount remote storageTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - The hosts.allow file limits access to the local networkTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION