Item Search

NameAudit NamePluginCategory
1 - Application specific logging - ${jetty.base}/start.ini --module=loggingTNS Best Practice Jetty 9 LinuxUnix
1 - Remove or Disable Example Content - ExampleDSTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.websocket.LEVEL=DEBUGTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

3 - Audit Logging - HandlerTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

4.9 (L1) Host must transmit audit records to a remote log collectorCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

5 - Granular Log LevelsTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

6 - EncryptionTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - File system permissions of log filesTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

7 - SSL implementation - start.ini --module=deployTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

8 - Management IP - .htacess existsTNS Best Practice Jetty 9 LinuxUnix
9 - Deployment ScannerTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

12 - Remove and mask informational headers - JSP ConfigurationTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

13 - Restrict access to temp directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - Restrict access to binaries directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

15 - Restrict access to web application directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Restrict access to JETTY.properties - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

17 - Setup a security domainTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

18 - Role Based Authentication per queueTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/balancerTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/webdavTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

29 - Ensure secure is set to true only for SSL-enabled ConnectorsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

31 - Starting with Security ManagerTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

32 - Disabling auto deployment of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

33 - Disable deploy on startup of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

40 - Do not allow symbolic linkingTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

42 - Do not allow cross context requestsTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

43 - Do not resolve hosts on logging valves - SERVER_XMLTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

44 - Use Lockout RealmsTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

Adtran : Disable SSLv2TNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Enable NTPTNS Adtran AOS Best Practice AuditAdtran
Adtran : Enable service password-encryptionTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Encrypt enable passwordTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Ensure DHCP is Disabled unless neededTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Ensure the log level is set at an appropriate settingTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Adtran : Set 'login' BannerTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : SNMP 'PUBLIC' community string not usedTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Web Session Timeout <= 900 secsTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

F5BI-AP-300043 - The F5 BIG-IP appliance that provides intermediary services for HTTP must inspect inbound and outbound HTTP traffic for protocol compliance and protocol anomalies.DISA F5 BIG-IP TMOS ALG STIG v1r2F5

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: Disable FTP IPV4TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Disable FTP IPV6TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Disable Telnet on IPV6TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Require service timestampTNS Huawei VRP Best Practice AuditHuawei

AUDIT AND ACCOUNTABILITY

Huawei: SSH Max Retries <= 3TNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: User Interfaces are AuthenticatedTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: User Interfaces Configured Inbound SSHTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

OL07-00-010020 - The Oracle Linux operating system must be configured so that the cryptographic hash of system files and commands matches vendor values.DISA Oracle Linux 7 STIG v3r3Unix

CONFIGURATION MANAGEMENT

PANW-IP-000053 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when rootkits or other malicious software which allows unauthorized privileged or non-privileged access is detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

PANW-IP-000056 - The Palo Alto Networks security platform must generate an alert to, at a minimum, the ISSO and ISSM when new active propagation of malware infecting DoD systems or malicious code adversely affecting the operations and/or security of DoD systems is detected.DISA STIG Palo Alto IDPS v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

Salesforce.com : AuthConfig - 'Auth Providers = Salesforce'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
SYMP-AG-000260 - Symantec ProxySG providing intermediary services for HTTP must inspect inbound HTTP traffic for protocol compliance and protocol anomalies - InternalDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION