Item Search

NameAudit NamePluginCategory
1.2 Use IP address rather than hostnameCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

CONFIGURATION MANAGEMENT

1.2 Use IP address rather than hostnameCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

2.3.1 - MobileIron - Enable Prevent Move for Sensitive Mail Accounts - EXCHANGE ConfigurationsMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

2.3.2 - MobileIron - Require Use Only in Mail for Sensitive Mail Accounts - EMAIL ConfigurationsMobileIron - CIS Apple iOS 8 v1.0.0 L2MDM

ACCESS CONTROL

2.3.2 - MobileIron - Require Use Only in Mail for Sensitive Mail Accounts - EXCHANGE ConfigurationsMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

2.3.10.11 Ensure 'Network access: Sharing and security model for local accounts' is set to 'Classic - local users authenticate as themselves'CIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

2.4.2 Disable Internet SharingCIS Apple macOS 10.13 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.4.4 Disable Printer SharingCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.23 Disable Mounting of squashfs FilesystemsCIS Debian Linux 7 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.24 Disable Mounting of udf FilesystemsCIS Debian Linux 7 L2 v1.0.0Unix

CONFIGURATION MANAGEMENT

3.1.8 Require instance name for discovery requestsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

CONFIGURATION MANAGEMENT

3.1.8 Require instance name for discovery requestsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

3.1.15 Auto-restart after abnormal terminationCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

CONFIGURATION MANAGEMENT

3.1.18 Reserve the desired port number or name for incoming SSL connectionsCIS IBM DB2 9 Benchmark v3.0.1 Level 2 OS LinuxUnix

CONFIGURATION MANAGEMENT

3.1.22 Set archive log failover retry limitCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

CONFIGURATION MANAGEMENT

3.6 Verify that docker.socket file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.10 Verify that docker-network environment file permissions are set to 644 or more restrictiveCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.13 Verify that docker-storage environment file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.19 Verify that TLS CA certificate file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

3.21 Verify that Docker server certificate file ownership is set to root:rootCIS Docker 1.6 v1.0.0 L1 DockerUnix

CONFIGURATION MANAGEMENT

4.3 Enable Debug Level Daemon Logging - Check if permissions for /var/log/connlog are OK.CIS Solaris 10 L1 v5.2Unix

AUDIT AND ACCOUNTABILITY

5.3 Enable Automatic Database MaintenanceCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

CONFIGURATION MANAGEMENT

5.3 Enable Automatic Database MaintenanceCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

CONFIGURATION MANAGEMENT

5.12 Require an administrator password to access system-wide preferencesCIS Apple macOS 10.12 L1 v1.2.0Unix

CONFIGURATION MANAGEMENT

6.1.1 Configure SSH - Check if Host * is set in /etc/ssh/ssh_config.CIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

7.4.5 Verify Permissions on /etc/hosts.denyCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

7.8 Set 'mesg n' as Default for All Users in /etc/.loginCIS Solaris 10 L1 v5.2Unix

CONFIGURATION MANAGEMENT

9.1.5 Set User/Group Owner and Permission on /etc/cron.weeklyCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.9 Secure plug-in library locationsCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

CONFIGURATION MANAGEMENT

10.1 Restrict access to the DB2 Control CenterCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

ACCESS CONTROL

10.2 Restrict access to the DB2 Configuration Assistant utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

ACCESS CONTROL

10.3 Restrict access to the DB2 Health Monitor utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

ACCESS CONTROL

10.4 Restrict access to the DB2 Activity Monitor utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

ACCESS CONTROL

10.4 Restrict access to the DB2 Activity Monitor utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

ACCESS CONTROL

10.6 Enable strict servlet ComplianceCIS Apache Tomcat 8 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

11.2 Remove OS Information from Login Warning Banners - /etc/issueCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

13.7 Check Permissions on User Home DirectoriesCIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

18.9.59.3.11.2 Ensure 'Do not use temporary folders per session' is set to 'Disabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

Huawei: User Interfaces Configured Inbound SSHTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

IBM i : Automatic Device Configuration (QAUTOCFG) - '0'IBM System i Security Reference for V7R1 and V6R1AS/400

CONFIGURATION MANAGEMENT

IBM i : Device Recovery Action (QDEVRCYACN) - '*DSCMSG'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT

IBM i : Remote Service Attribute (QRMTSRVATR) - '0'IBM System i Security Reference for V7R3AS/400

CONFIGURATION MANAGEMENT

IBM i : Scan File Systems (QSCANFS) - '*ROOTOPNUD'IBM System i Security Reference for V7R3AS/400

CONFIGURATION MANAGEMENT

IBM i : Scan File Systems Control (QSCANFSCTL)- '*NONE'IBM System i Security Reference for V7R1 and V6R1AS/400

CONFIGURATION MANAGEMENT

IBM i : Scan File Systems Control (QSCANFSCTL)- '*NONE'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT

Internet Explorer Processes - FEATURE_ZONE_ELEVATION - (Reserved)MSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Internet Explorer Processes - FEATURE_ZONE_ELEVATION - iexplore.exeMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Specify use of ActiveX Installer Service for installation of ActiveX controlsMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Turn on Protected Mode - Internet ZoneMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Turn on the auto-complete feature for user names and passwords on forms - FormSuggest Passwords MainMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT