Item Search

NameAudit NamePluginCategory
2.1.1.6 Audit Find My MacCIS Apple macOS 14.0 Sonoma v2.0.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.15 Audit DictationCIS Apple macOS 12.0 Monterey v4.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.18.1 Audit DictationCIS Apple macOS 13.0 Ventura v3.0.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

3.5.1 Ensure 'Disable Association MAC Randomization' is 'Configured'AirWatch - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmorCIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmorCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmor.dCIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - /etc/apparmor.d/CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - /usr/share/selinuxCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/apparmor.dCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/apparmor.dCIS Debian Family Workstation L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/apparmor/CIS Ubuntu Linux 16.04 LTS Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /etc/selinuxCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's Mandatory Access Controls are collected - auditctl /usr/share/selinuxCIS Debian Family Server L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

4.6 Ensure nfs server is not runningCIS Apple OSX 10.9 L1 v1.3.0Unix

CONFIGURATION MANAGEMENT

4.10 Verify iPhone Mirroring SettingsMobileIron - CIS Apple iOS 18 v1.0.0 L1 End User OwnedMDM

CONFIGURATION MANAGEMENT

4.10 Verify iPhone Mirroring SettingsAirWatch - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT

4.10 Verify iPhone Mirroring SettingsAirWatch - CIS Apple iOS 18 Benchmark v1.0.0 L1 End User OwnedMDM

CONFIGURATION MANAGEMENT

4.10 Verify iPhone Mirroring SettingsMobileIron - CIS Apple iOS 18 v1.0.0 L1 Institution OwnedMDM

CONFIGURATION MANAGEMENT

5.1.4 Ensure Library Validation Is EnabledCIS Apple macOS 10.14 v2.0.0 L1Unix

CONFIGURATION MANAGEMENT

5.2.14 Ensure only strong MAC algorithms are used - approved MAC algorithmsCIS Distribution Independent Linux Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - approved MAC algorithmsCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - weak MAC algorithmsCIS Distribution Independent Linux Server L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.14 Ensure only strong MAC algorithms are used - weak MAC algorithmsCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.8 Extensible Firmware Interface (EFI) passwordCIS Apple OSX 10.9 L2 v1.3.0Unix
AIOS-17-010850 - Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-17-010850 - Apple iOS/iPadOS 17 must implement the management setting: not allow use of iPhone widgets on Mac.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT

AIOS-18-010850 - Apple iOS/iPadOS 18 must implement the management setting: not allow use of iPhone widgets on Mac.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

CONFIGURATION MANAGEMENT

Big Sur - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

BIND-9X-001702 - The BIND 9.x server implementation must prohibit the forwarding of queries to servers controlled by organizations outside of the U.S. Government.DISA BIND 9.x STIG v2r3Unix

CONFIGURATION MANAGEMENT

Catalina - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

DISA STIG VMware vSphere ESXi 6 Security Technical Implementation Guide Version 1 Release 5DISA STIG VMware vSphere 6.x ESXi OS v1r5Unix
DISA_STIG_McAfee_VirusScan_8.8_Managed_Client_v6r1.audit from DISA McAfee VirusScan 8.8 Managed Client Security Technical implementation Guide v6r1 STIGDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows
DISA_STIG_McAfee_VSEL_1.9.x_2.0.x_Local_Client_v1r6.audit from DISA McAfee VSEL 1.9/2.0 Local Client v1r6 STIGMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix
DISA_STIG_Microsoft_Office_Access_2016_v1r1.audit for Microsoft Office Access 2016, from DISA STIG Microsoft Office Access 2016 v1r1DISA STIG Microsoft Office Access 2016 v1r1Windows
DISA_STIG_Microsoft_OneNote_2016_v1r2.audit for Microsoft OneNote 2016, from DISA STIG Microsoft OneNote 2016 v1r2DISA STIG Microsoft OneNote 2016 v1r2Windows
DISA_STIG_Server_2012_and_2012_R2_DC_v3r7.audit from DISA Microsoft Windows Server 2012/2012 R2 Domain Controller v3r7 STIGDISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows
DISA_STIG_Server_2012_and_2012_R2_MS_v3r7.audit from DISA Microsoft Windows Server 2012/2012 R2 Member Server v3r7 STIGDISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows
DISA_STIG_Splunk_Enterprise_7.x_for_Windows_REST_API_v3r1.audit from DISA Splunk Enterprise 7.x for Windows v3r1 STIGDISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk
DISA_VMware_vSphere_8.0_vCenter_Appliance_Photon_OS_4.0_STIG_v2r1.audit from DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix
EX16-ED-000570 - Exchange must render hyperlinks from email sources from non-.mil domains as unclickable.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

GEN002860 - Audit logs must be rotated daily.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN002860 - Audit logs must be rotated daily.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

Monterey - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Monterey v1.0.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure System to Fail to a Known Safe State if System Initialization, Shutdown, or Abort FailsNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION