Item Search

NameAudit NamePluginCategory
2.2.45 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

19.7.15.1.2 Ensure 'Turn on off details pane' is set to 'Enabled: Always hide'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.31 Ensure 'Host-based firewall is installed and enabled'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

20.46 Ensure 'Passwords Expire' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION

20.71 Ensure 'Windows PowerShell 2.0' is 'not installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.71 Ensure 'Windows PowerShell 2.0' is 'not installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.71 Ensure 'Windows PowerShell 2.0' is 'not installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.71 Ensure 'Windows PowerShell 2.0' is 'not installed'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

OL6-00-000008 - Vendor-provided cryptographic certificates must be installed to verify the integrity of system software.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000015 - The system package management tool must cryptographically verify the authenticity of all software packages during installation.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000016 - A file integrity tool must be installed.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000021 - The Oracle Linux operating system must not contain .shosts or shosts.equiv files.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000023 - The system must use a Linux Security Module configured to limit the privileges of system services.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000028 - The system must prevent the root account from logging in from serial consoles.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000037 - The /etc/gshadow file must be group-owned by root.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000218 - The rlogind service must not be running - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000220 - The ypserv package must not be installed.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000247 - The system clock must be synchronized continuously, or at least daily - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000252 - If the system is using LDAP for authentication or account information, the system must use a TLS connection using FIPS 140-2 approved cryptographic algorithms.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000260 - The system must display a publicly-viewable pattern during a graphical desktop environment session lock.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000261 - The Automatic Bug Reporting Tool (abrtd) service must not be running - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000265 - The ntpdate service must not be running - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000265 - The ntpdate service must not be running - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000268 - The rdisc service must not be running - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000274 - The system must prohibit the reuse of passwords within five iterations - password-authDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000279 - The system package management tool must verify ownership on all files and directories associated with the audit package.DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000286 - The x86 Ctrl-Alt-Delete key sequence must be disabled - /usr/bin/loggerDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000288 - The sendmail package must be removed.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000290 - X Windows must not be enabled unless required.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000297 - Temporary accounts must be provisioned with an expiration date.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000298 - Emergency accounts must be provisioned with an expiration date.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000302 - A file integrity tool must be used at least weekly to check for unauthorized file changes, particularly the addition of unauthorized system libraries or binaries, or for unauthorized modification to authorized system libraries or binaries.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000306 - The operating system must detect unauthorized changes to software and information.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000326 - The Department of Defense (DoD) login banner must be displayed immediately prior to, or as part of, graphical desktop environment login prompts.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000331 - The Bluetooth service must be disabled - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000338 - The TFTP daemon must operate in secure mode which provides access only to a single directory on the host file system.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000343 - The system default umask for the csh shell must be 077.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000345 - The system default umask in /etc/login.defs must be 077.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000356 - The system must require administrator action to unlock an account locked by excessive failed login attempts - system-authDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000357 - The system must disable accounts after excessive login failures within a 15-minute interval - password-auth fail_intervalDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000503 - The operating system must enforce requirements for the connection of mobile devices to operating systems.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000507 - The operating system, upon successful logon, must display to the user the date and time of the last logon or access via ssh.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000517 - The system package management tool must verify group-ownership on all files and directories associated with packages.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000518 - The system package management tool must verify permissions on all files and directories associated with packages.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000526 - Automated file system mounting tools must not be enabled unless needed - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000532 - The Oracle Linux operating system must mount /dev/shm with the noexec option.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000536 - The Oracle Linux operating system must use the invoking user's password for privilege escalation when using 'sudo' - targetpwDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000539 - The Oracle Linux operating system must not be configured to bypass password requirements for privilege escalation.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

Palo Alto software version 6 not found.CIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto
Palo Alto software version 6 not found.CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto