Item Search

NameAudit NamePluginCategory
2.1.4 Ensure 'SECURE_REGISTER_' Is Set to 'TCPS' or 'IPC'CIS Oracle Server 18c Linux v1.1.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 7 v1.2.0 L1 WindowsWindows

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 6 v1.2.0 L1 MongoDBWindows

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 6 v1.2.0 L1 MongoDBUnix

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 7 v1.2.0 L1 UnixUnix

IDENTIFICATION AND AUTHENTICATION

2.2 Ensure that MongoDB does not bypass authentication via the localhost exceptionCIS MongoDB 8 v1.0.0 L1 UnixUnix

IDENTIFICATION AND AUTHENTICATION

4.1.4.1 Ensure Audit logs are owned by root and mode 0600 or less permissiveCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

4.1.4.1 Ensure Audit logs are owned by root and mode 0600 or less permissiveCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

5.11 (L1) Host must isolate management communicationsCIS VMware ESXi 8.0 v1.3.0 L1 VMwareVMware

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

6.3 Mask and zone SAN resources appropriatelyCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
6.5.1 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated ciphersCIS VMware ESXi 8.0 v1.3.0 L1 UnixUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.5.6 (L1) Host SSH daemon, if enabled, must set a timeout interval on idle sessionsCIS VMware ESXi 8.0 v1.3.0 L1 UnixUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

8.1.11 Ensure that Microsoft Cloud Security Benchmark policies are not set to 'Disabled'CIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

9.23 Find Un-owned Files and DirectoriesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.23 Find Un-owned Files and DirectoriesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.24 Find Un-owned Files and DirectoriesCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

Disable unused network portsTNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice AuditAlcatel

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'aaa local authentication max failed attempts' is set to your organization's poicyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'HTTP source restriction' is set to an authorized IP addressTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Integrity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'ip verify' is set to 'reverse-path' for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'logging buffer size' is greater than or equal to '524288' bytes (512kb)Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging buffered severity ' is greater than or equal to '3'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging to monitor' is disabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging to monitor' is disabled - show loggingTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging to Serial console' is disabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging trap severity ' is greater than or equal to '5'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'Password Policy' is enabled - minimum-lengthTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

IDENTIFICATION AND AUTHENTICATION

Ensure 'SNMP community string' is not the default stringTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

IDENTIFICATION AND AUTHENTICATION

Ensure 'SNMP traps' is enabled - linkdownTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'snmp-server group' is set to 'v3 priv'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'snmp-server group' is set to 'v3 priv' - show snmp-serverTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure 'SSH source restriction' is set to an authorized IP addressTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'syslog hosts' is configured correctlyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'TACACS+/RADIUS' is configured correctly - protocolTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'TLS 1.0' is set for HTTPS accessTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure DHCP services are disabled for untrusted interfaces - dhcpdTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure DHCP services are disabled for untrusted interfaces - dhcprelayTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure email logging is configured for critical to emergencyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure ICMP is restricted for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure non-default application inspection is configured correctlyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure timezone is properly configuredTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

EX13-EG-000005 - Exchange must limit the Receive connector timeout.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

ACCESS CONTROL

EX16-ED-000010 - Exchange must limit the Receive connector timeout.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

ACCESS CONTROL

MD7X-00-000150 MongoDB must limit the total number of concurrent connections to the database.DISA MongoDB Enterprise Advanced 7.x STIG v1r1Unix

ACCESS CONTROL

Tenable_Best_Practices_Cisco_Firepower_Management_Center_OS.auditTenable Cisco Firepower Management Center OS Best Practices AuditUnix