Item Search

NameAudit NamePluginCategory
3.10 (L1) Host must not suppress warnings that the shell is enabledCIS VMware ESXi 8.0 v1.2.0 L1VMware

SYSTEM AND INFORMATION INTEGRITY

4.2.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 11 v1.2.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.3.2 Restrict Access to SYSIBM.SYSAUDITUSECIS IBM DB2 11 v1.2.0 Database Level 1IBM_DB2DB

ACCESS CONTROL, MEDIA PROTECTION

4.9 (L1) Host must transmit audit records to a remote log collectorCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB

ACCESS CONTROL

6.2 Restrict Access to SYSCAT.AUDITUSECIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

7.1.1.10 Ensure that Intune logs are captured and sent to Log AnalyticsCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

AUDIT AND ACCOUNTABILITY

AIX7-00-002140 - The AIX /etc/hosts file must be owned by root.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002141 - The AIX /etc/hosts file must be group-owned by system.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002142 - The AIX /etc/hosts file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA Cisco IOS Switch L2S STIG v3r1Cisco

CONFIGURATION MANAGEMENT

DTBC-0052 - Deletion of browser history must be disabled.DISA Google Chrome Current Windows STIG v2r11Windows

AUDIT AND ACCOUNTABILITY

Extreme : Configure idletimeout <= 15TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

ACCESS CONTROL

Extreme : Password Policy - char-validationTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

Extreme : Password Policy - min-length >= 8TNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

IDENTIFICATION AND AUTHENTICATION

F5BI-AS-000165 - To protect against data mining, The BIG-IP ASM module must be configured to detect SQL injection attacks launched against data storage objects, including, at a minimum, databases, database records, and database fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r2F5

ACCESS CONTROL

F5BI-LT-000165 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect SQL injection attacks being launched against data storage objects, including, at a minimum, databases, database records, and database fields.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

ACCESS CONTROL

Fortigate - Admin password lockout >= 300 secondsTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - Admin SCP - 'disabled'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - Alert Emails - 'admin address'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND INFORMATION INTEGRITY

Fortigate - Antispam License - Not ExpiredTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT

Fortigate - Disable auto USB installation - 'config'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT

Fortigate - Does not use self-signed certificate - 'user'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - External Logging - 'fortianalyzer2'TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

AUDIT AND ACCOUNTABILITY

Fortigate - Login Banner - post-login-bannerTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - Password Complexity - 1 uppercase letterTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - Password Complexity - at least 1 charTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - Password Complexity - length >= 8TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - Password Expiry date <= 30 daysTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - RADIUS, LDAP, or TACACS+ response wait periodTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - SNMP is enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT

Fortigate - SNMP v3 uses SHA instead of MD5TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-IP-000005 - The Juniper Networks SRX Series Gateway IDPS must block outbound traffic containing known and unknown DoS attacks by ensuring that rules are applied to outbound communications traffic.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

List crash dumpsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List non-default VM templatesTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM CPU allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

NTP client configuredTNS Citrix HypervisorUnix

AUDIT AND ACCOUNTABILITY

OL07-00-010020 - The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.DISA Oracle Linux 7 STIG v3r3Unix

CONFIGURATION MANAGEMENT

OL07-00-040190 - The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications - LDAP communications.DISA Oracle Linux 7 STIG v3r3Unix

ACCESS CONTROL

OL07-00-040200 - The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications - LDAP communications.DISA Oracle Linux 7 STIG v3r3Unix

ACCESS CONTROL

OL07-00-040200 - The Oracle Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.DISA Oracle Linux 7 STIG v3r3Unix

ACCESS CONTROL

PANW-IP-000041 - The Palo Alto Networks security platform must protect against or limit the effects of known and unknown types of denial-of-service (DoS) attacks by employing rate-based attack prevention behavior analysis (traffic thresholds) - traffic thresholdsDISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-IP-000053 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged or non-privileged access is detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000056 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-010020 - The Red Hat Enterprise Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-040200 - The Red Hat Enterprise Linux operating system must implement cryptography to protect the integrity of Lightweight Directory Access Protocol (LDAP) communications.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - InternalDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - List crash dumpsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List non-default VM templatesTNS Citrix XenServerUnix
XenServer - List VM memory allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT