Item Search

NameAudit NamePluginCategory
1.3.1 Ensure AIDE is installedCIS Amazon Linux 2023 v1.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

1.3.1 Ensure AIDE is installedCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.6 Ensure monitoring and alerting exist for changes to network policies and associated objectsCIS Snowflake Foundations v1.0.0 L1Snowflake

AUDIT AND ACCOUNTABILITY

2.38 (L2) Ensure 'Controls the mode of DNS-over-HTTPS' is set to 'Enabled: DNS-over-HTTPS without insecure fallback'CIS Google Chrome Group Policy v1.0.0 L2Windows

ACCESS CONTROL, AWARENESS AND TRAINING, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.1 Ensure AIDE is installedCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.1 Ensure AIDE is installedCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.1 Ensure AIDE is installedCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.3.1 Ensure AIDE is installedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS Rocky Linux 10 v1.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS AlmaLinux OS 8 v4.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS Rocky Linux 8 v3.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Red Hat Enterprise Linux 8 v4.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Rocky Linux 10 v1.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Rocky Linux 8 v3.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS SUSE Linux Enterprise 15 v2.0.1 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS Oracle Linux 10 v1.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS AlmaLinux OS 10 v1.0.0 L1 WorkstationUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1.1 Ensure AIDE is installedCIS Red Hat Enterprise Linux 10 v1.0.1 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS AlmaLinux OS 10 v1.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 ServerUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure AIDE is installedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 WorkstationUnix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

6.3.1 Ensure AIDE is installedCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

SYSTEM AND INFORMATION INTEGRITY

6.9 Ensure that PAN-DB URL Filtering is usedCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

6.9 Ensure that PAN-DB URL Filtering is usedCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.17 Ensure that a Zone Prot Profile with tuned Flood Protection settings enabledCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Big Sur - Disable Accounts after 35 Days of InactivityNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Accounts after 35 Days of InactivityNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Accounts after 35 Days of InactivityNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

EX19-ED-000122 - Active hyperlinks in messages from non .mil domains must be rendered unclickable.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND INFORMATION INTEGRITY

EX19-ED-000238 - Exchange must render hyperlinks from email sources from non-.mil domains as unclickable.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JRE8-UX-000090 - Oracle JRE 8 must lock the dialog enabling users to grant permissions - deployment.security.askgrantdialog.showDISA STIG Oracle JRE 8 Unix v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Disable Accounts after 35 Days of InactivityNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Accounts after 35 Days of InactivityNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Accounts after 35 Days of InactivityNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection.DISA Palo Alto Networks ALG STIG v3r4Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-06-000285 - The system must have a host-based intrusion detection tool installed - MFEhiplsmDISA Red Hat Enterprise Linux 6 STIG v2r2Unix

CONFIGURATION MANAGEMENT

SYMP-AG-000240 - The reverse proxy Symantec ProxySG providing intermediary services for FTP must inspect inbound FTP communications traffic for protocol compliance and protocol anomalies - Review ProxiesDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000660 - Symantec ProxySG providing content filtering must send an alert to, at a minimum, the ISSO and ISSM when detection events occur.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND INFORMATION INTEGRITY

WG237 W22 - Remote authors or content providers must have all files scanned for malware before uploading files to the Document Root directory.DISA STIG Apache Server 2.2 Windows v1r13Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000004 - Microsoft Defender AV must be configured to run and scan for malware and other potentially unwanted software.DISA Microsoft Defender Antivirus STIG v2r8Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000068 - Microsoft Defender AV must enable network protection to be configured into block or audit mode on Windows Server.DISA Microsoft Defender Antivirus STIG v2r8Windows

SYSTEM AND COMMUNICATIONS PROTECTION