Item Search

NameAudit NamePluginCategory
1.3.2 Ensure sudo commands use ptyCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

4.1.8 Ensure session initiation information is collected - utmpCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.8 Ensure session initiation information is collected - wtmpCIS Ubuntu Linux 18.04 LXD Host L2 Server v1.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - '/var/run/utmp'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - 'auditctl utmp'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - 'auditctl wtmp'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - /var/log/btmpCIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - auditctl /var/log/btmpCIS Debian 9 Workstation L2 v1.0.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - auditctl /var/log/btmpCIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - auditctl btmpCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.9 Ensure session initiation information is collected - auditctl wtmpCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.10 Ensure session initiation information is collected - auditctl utmpCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

4.1.10 Ensure session initiation information is collected - utmpCIS Distribution Independent Linux Server L2 v2.0.0Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

5.2.2 Ensure sudo commands use ptyCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.3.9 Collect Login and Logout Events - /var/log/faillogCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

6.1 Restrict Access to SYSCAT.AUDITPOLICIESCIS IBM DB2 9 Benchmark v3.0.1 Level 1 DBIBM_DB2DB

ACCESS CONTROL

8.1.9 Collect Session Initiation Information- '/var/log/btmp'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.1.9 Collect Session Initiation Information- '/var/log/wtmp'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.1.9 Collect Session Initiation Information- '/var/run/utmp'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.3 Set Account Expiration Parameters On Active Accounts, Password length greater than equal 6.CIS Solaris 9 v1.3Unix

IDENTIFICATION AND AUTHENTICATION

AIX7-00-002144 - The AIX /etc/syslog.conf file must be owned by root.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002145 - The AIX /etc/syslog.conf file must be group-owned by system.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

AIX7-00-002146 - The AIX /etc/syslog.conf file must have a mode of 0640 or less permissive.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

ALMA-09-045340 - AlmaLinux OS 9 must have the Advanced Intrusion Detection Environment (AIDE) package installed.DISA CloudLinux AlmaLinux OS 9 STIG v1r4Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

APPL-15-003080 - The macOS system must disable accounts after 35 days of inactivity.DISA Apple macOS 15 Sequoia STIG v1r5Unix

ACCESS CONTROL

APPL-26-003080 - The macOS system must disable accounts after 35 days of inactivity.DISA Apple macOS 26 Tahoe STIG v1r1Unix

ACCESS CONTROL

BIND-9X-001041 - The BIND 9.x server implementation must be configured with a channel to send audit records to a local file.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

BIND-9X-001042 - The BIND 9.x server implementation must maintain at least 3 file versions of the local log file.DISA BIND 9.x STIG v2r3Unix

AUDIT AND ACCOUNTABILITY

Brocade - Bottleneck alerts must be enabledTenable Best Practices Brocade FabricOSBrocade

AUDIT AND ACCOUNTABILITY

Ensure session initiation information is collected - auditctl utmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure session initiation information is collected - utmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

Ensure session initiation information is collected - wtmpTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

F5BI-AP-300041 - The F5 BIG-IP appliance that provides intermediary services for SMTP must inspect inbound and outbound SMTP and Extended SMTP communications traffic for protocol compliance and protocol anomalies.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

F5BI-LT-000303 - The BIG-IP Core implementation must be configured to inspect for protocol compliance and protocol anomalies in inbound SMTP and Extended SMTP communications traffic to virtual servers.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

FireEye - Web-analysis incident listTNS FireEyeFireEye

AUDIT AND ACCOUNTABILITY

GOOG-12-006800 - Google Android 12 must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Google Android 12 COBO v1r2MDM

ACCESS CONTROL

GOOG-13-006800 - Google Android 13 must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Google Android 13 COPE v2r2MDM

ACCESS CONTROL

GOOG-13-706800 - Google Android 13 must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Google Android 13 BYOD v1r2MDM

ACCESS CONTROL

GOOG-14-006800 - Google Android 14 must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Google Android 14 COPE v2r2MDM

ACCESS CONTROL

GOOG-15-006800 - Google Android 15 must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Google Android 15 COPE v1r2MDM

ACCESS CONTROL

HONW-13-006800 - Honeywell Android 13 must be configured to not display the following (work profile) notifications when the device is locked:AirWatch - DISA Honeywell Android 13 COPE v1r1MDM

ACCESS CONTROL

JUSX-IP-000009 - The Juniper Networks SRX Series Gateway IDPS must block any prohibited mobile code at the enclave boundary when it is detected.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000008 - The Juniper SRX Services Gateway VPN must be configured to use IPsec with SHA256 or greater to negotiate hashing to protect the integrity of remote access sessions.DISA Juniper SRX Services Gateway VPN v3r2Juniper

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

OL6-00-000197 - The audit system must be configured to audit failed attempts to access files and programs - b64 EPERM auid>=500DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL09-00-000300 - OL 9 must have the Advanced Intrusion Detection Environment (AIDE) package installed.DISA Oracle Linux 9 STIG v1r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

PANW-AG-000062 - The Palo Alto Networks security platform must drop malicious code upon detection.DISA STIG Palo Alto ALG v3r4Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000043 - The Palo Alto Networks security platform must use a Vulnerability Protection Profile that blocks any critical, high, or medium threats.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-010510 - The SUSE operating system must notify the System Administrator (SA) when AIDE discovers anomalies in the operation of any security functions.DISA SLES 12 STIG v3r3Unix

SYSTEM AND INFORMATION INTEGRITY

UBTU-24-100840 - Ubuntu 24.04 LTS SSH server must be configured to use only FIPS 140-3 validated key exchange algorithms.DISA Canonical Ubuntu 24.04 LTS STIG v1r3Unix

ACCESS CONTROL

WN12-CC-000065 - The detection of compatibility issues for applications and drivers must be turned off.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT