Item Search

NameAudit NamePluginCategory
2.2.2 Ensure rsh client is not installedCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

3.5.2.5 SNMP - restrict community access - restrict community accessCIS IBM AIX 7.1 L2 v2.1.0Unix

CONFIGURATION MANAGEMENT

4.7.3.1 Ensure latest version of openssh is installedCIS IBM AIX 7 v1.0.0 L1Unix

CONFIGURATION MANAGEMENT, MAINTENANCE

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

Android Compliance Policy - Block USB debugging on deviceTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Compliance Policy - Required password typeTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Browser Pop-upsTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Device Configuration - NFCTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Removable storageTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Wi-Fi tetheringTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Copy and paste between work and personal profilesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Prevent app installations from unknown sources in the personal profileTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

BIND-9X-001050 - The BIND 9.x secondary name server must limit the number of zones requested from a single master name server.DISA BIND 9.x STIG v2r3Unix

ACCESS CONTROL

BIND-9X-001051 - The BIND 9.x secondary name server must limit the total number of zones the name server can request at any one time.DISA BIND 9.x STIG v2r3Unix

ACCESS CONTROL

BIND-9X-001052 - The BIND 9.x server implementation must limit the number of concurrent session client connections to the number of allowed dynamic update clients.DISA BIND 9.x STIG v2r3Unix

ACCESS CONTROL

DB2X-00-000300 - DB2 must integrate with an organization-level authentication/access mechanism providing account management and automation for all users, groups, roles, and any other principalsDISA STIG IBM DB2 v10.5 LUW v2r1 OS LinuxUnix

ACCESS CONTROL

DTAVSEL-106 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-107 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-110 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-111 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

IBM i : Auditing Control (QAUDCTL) - '!= *NONE'IBM System i Security Reference for V7R2AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Auditing Control (QAUDCTL) - '!= *NONE'IBM System i Security Reference for V7R1 and V6R1AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Auditing Level (QAUDLVL) - '*SECURITY'IBM System i Security Reference for V7R1 and V6R1AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Auditing Level (QAUDLVL) - '*SECURITY'IBM System i Security Reference for V7R2AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Auditing Level (QAUDLVL2) - '*SECURITY'IBM System i Security Reference for V7R3AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Auditing Level (QAUDLVL2) - '*SECURITY'IBM System i Security Reference for V7R2AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Automatic Device Configuration (QAUTOCFG) - '0'IBM System i Security Reference for V7R3AS/400

CONFIGURATION MANAGEMENT

IBM i : Block Password Change (QPWDCHGBLK) - '>=48'IBM System i Security Reference for V7R2AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Limit Device Sessions (QLMTDEVSSN) - '1'IBM System i Security Reference for V7R1 and V6R1AS/400

ACCESS CONTROL

IBM i : Password Approval Program (QPWDVLDPGM) - '*NONE'IBM System i Security Reference for V7R3AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Password Level (QPWDLVL) - '>=0'IBM System i Security Reference for V7R2AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Password Level (QPWDLVL) - '>=0'IBM System i Security Reference for V7R1 and V6R1AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Password Rules (QPWDRULES) - '*PWDSYSVAL'IBM System i Security Reference for V7R1 and V6R1AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Password Rules (QPWDRULES) - '*PWDSYSVAL'IBM System i Security Reference for V7R2AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Remote Service Attribute (QRMTSRVATR) - '0'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

RHEL-07-030321 - The Red Hat Enterprise Linux operating system must be configured so that the audit system takes appropriate action when there is an error sending audit records to a remote system.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

AUDIT AND ACCOUNTABILITY

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 106'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 108'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 117'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 135'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 177'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

Windows Compliance Policy - Encryption of data storage on deviceTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL

Windows Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Browser AutofillTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Device name modificationTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL