Item Search

NameAudit NamePluginCategory
1 - Remove or Disable Example Content - ExampleDSTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

1.3 Account Anti-riot AttackTenable ZTE ROSNGZTE_ROSNG

ACCESS CONTROL

1.6 Support Web Access Security - c) versionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - a) Disable encryption noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

3 - Audit Logging - HandlerTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

3.3 Authentication and Verification of BGP Routing ProtocolsTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

5 - Granular Log LevelsTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

7 - File system permissions of log filesTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

7.1.1.7 Ensure that virtual network flow logs are captured and sent to Log AnalyticsCIS Microsoft Azure Foundations v4.0.0 L2microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

9 - Deployment ScannerTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

12 - Remove and mask informational headers - JSP ConfigurationTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

17 - Setup a security domainTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

18 - Role Based Authentication per queueTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

Adtran : Disable SSLv2TNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable NTPTNS Adtran AOS Best Practice AuditAdtran
Adtran : Enable service password-encryptionTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Encrypt enable passwordTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Ensure DHCP is Disabled unless neededTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Ensure the log level is set at an appropriate settingTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Adtran : Set 'login' BannerTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : SNMP 'PUBLIC' community string not usedTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Web Session Timeout <= 900 secsTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

F5BI-AS-000163 - To protect against data mining, The BIG-IP ASM module must be configured to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r2F5

ACCESS CONTROL

GEN006560 - The system vulnerability assessment tool, host-based intrusion detection tool, and file integrity tool must notify SA and IAO.DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

GEN006560 - The system vulnerability assessment, host-based intrusion detection, and file integrity tools must notify of a security breach.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Host versionTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r3Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-IP-000025 - The IDPS must send an alert to, at a minimum, the ISSO and ISSM when DoS incidents are detected.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

List crash dumpsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List halted VMsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List non-default VM templatesTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List running VMsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List security rolesTNS Citrix HypervisorUnix

ACCESS CONTROL

List VM CPU allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM memory allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

NTP client configuredTNS Citrix HypervisorUnix

AUDIT AND ACCOUNTABILITY

PANW-AG-000111 - The Palo Alto Networks security platform must be configured to integrate with a system-wide intrusion detection system.DISA STIG Palo Alto ALG v3r4Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000024 - The Palo Alto Networks security platform must install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

Review accounts used to mount remote storageTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

RHEL-09-651035 - RHEL 9 must be configured so that the file integrity tool verifies extended attributes.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

The hosts.deny file blocks access by defaultTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-255060 - Ubuntu 22.04 LTS SSH server must be configured to use only FIPS-validated key exchange algorithms.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

ACCESS CONTROL

XAPI SSL certificate is in default locationTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

XenServer - List bonded NIC groupsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List crash dumpsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List non-default VM templatesTNS Citrix XenServerUnix
XenServer - List VLANsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VM memory allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - NTP client configuredTNS Citrix XenServerUnix

AUDIT AND ACCOUNTABILITY

XenServer - The hosts.allow file limits access to the local networkTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION