Item Search

NameAudit NamePluginCategory
2.02 Version/Patches - 'Ensure the latest version of Oracle software is being used, and the latest patches are from Metalink are applied'CIS v1.1.0 Oracle 11g OS L1Unix
2.11 Ensure Unnecessary SQL Server Protocols are set to 'Disabled' - 'Shared Memory protocol is enabled'CIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

SYSTEM AND INFORMATION INTEGRITY

2.12 Ensure SQL Server is configured to use non-standard portsCIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

SYSTEM AND INFORMATION INTEGRITY

3.4 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2022 Database L1 AWS RDS v1.1.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL

5.1 Ensure 'Maximum number of error log files' is set to greater than or equal to '12'CIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

AUDIT AND ACCOUNTABILITY

5.3 Ensure 'Login Auditing' is set to 'failed logins'CIS Microsoft SQL Server 2019 v1.5.0 L1 Database EngineMS_SQLDB

AUDIT AND ACCOUNTABILITY

Brocade - Banner TextTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - Brocade licenses must not be expiredTenable Best Practices Brocade FabricOSBrocade

CONFIGURATION MANAGEMENT

Brocade - Disable Telnet IPv6Tenable Best Practices Brocade FabricOSBrocade

CONFIGURATION MANAGEMENT

Brocade - Enable HTTPSTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Enable the power-on self-test (POST)Tenable Best Practices Brocade FabricOSBrocade

SYSTEM AND INFORMATION INTEGRITY

Brocade - Enable the track changes feature for SNMP trapsTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Brocade - Fabric Element Authentication must be rejectedTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - IPfilter policy must be rejectedTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - lockout duration set to 30 minutesTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - minimum length of the password must be set to 9Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

Brocade - password history must be set to 1Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

Brocade - password warning must be set to at least 30 daysTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - sequential characters must be set to 2Tenable Best Practices Brocade FabricOSBrocade

IDENTIFICATION AND AUTHENTICATION

CGI-BIN directory should be disabled. 'Directory'TNS IBM HTTP Server Best PracticeWindows

CONFIGURATION MANAGEMENT

CGI-BIN directory should be disabled. 'LoadModule cgi_module'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Configuration files should be secured against unauthorized access.TNS IBM HTTP Server Best PracticeUnix
Ensure that multi-factor authentication is enabled for all accountsTenable Best Practices RackSpace v2.0.0Rackspace

IDENTIFICATION AND AUTHENTICATION

File permissions in the root document should only be accessible by administratorTNS IBM HTTP Server Best PracticeUnix
Latest Patches/Fixes should be installedTNS IBM HTTP Server Best PracticeUnix

SYSTEM AND INFORMATION INTEGRITY

Limit HTTP methods allowed by the Web Server.TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

Logs containing auditing information should be secured at the directory level.TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

MinSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Non-Essential modules should be disabled. 'mod_info'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

OpenStack Servers created since the last scanTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

OpenStack Servers updated since the last scanTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

Rackspace Database Backups created since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONTINGENCY PLANNING

Rackspace Servers and their detailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Servers created since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of active Rackspace Role Names (RBAC)Tenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Review the list of all Domains updated since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Current OpenStack UsersTenable Best Practices OpenStack v2.0.0OpenStack

ACCESS CONTROL

Review the list of DomainsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the List of Rackspace Users with Admin RolesTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Server version information parameters should be turned off - 'ServerSignature Off'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur - Event ID 16DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur - Event ID 17DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037500 - SQL Server must generate Trace or Audit records when successful logons or connections occur.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037900 - SQL Server must generate Trace or Audit records when logoffs or disconnections occur - Event ID 17DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037900 - SQL Server must generate Trace or Audit records when logoffs or disconnections occur - LOGOUT_GROUPDISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037900 - SQL Server must generate Trace or Audit records when logoffs or disconnections occur.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

StartServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION