Item Search

NameAudit NamePluginCategory
1.4 SNMP Security - c) SNMP Security Protection FunctionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.6 Support Web Access Security - c) versionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Log AuditingTenable ZTE ROSNGZTE_ROSNG

AUDIT AND ACCOUNTABILITY

1.8 SSH Strong Algorithm - a) Disable encryption noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - d) Disable encryption aes192-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - f) Disable encryption blowfish-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - i) Disable diffie-hellman group-exchange-sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - k) Disable hmac sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Disable the Proxy ARP Function - a) No proxyTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.3 Disable the Proxy ARP Function - c) No proxy localTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

3 - Configure log file size limit - SettingsTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

3.3 Authentication and Verification of BGP Routing ProtocolsTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

6 - Run your Instance as non privileged userTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

6.1.5 Ensure the file integrity tool is configured to verify ACLsCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

7 - SSL implementation - start.ini --module=httpsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.jar --module=httpsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

11 - Access Control - JAASTNS Best Practice Jetty 9 LinuxUnix
13 - Disable stacktrace in response bodyTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

13 - Restrict access to temp directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

14 - Restrict access to binaries directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

15 - Restrict access to web application directory - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

15 - Restrict access to web application directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

16 - ORB Subsystem - Initializers OnTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

16 - Restrict access to JETTY.policy - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

16 - Restrict access to JETTY.policy - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18 - Restrict access to context.xml - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

18 - Role Based Authentication per queueTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

19 - Restrict access to logging.properties - modeTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

20 - Restrict access to server.xml - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

24 - Remove extraneous files and directories - $JETTY_BASE/webapps/servlet-exampleTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

32 - Disabling auto deployment of applicationsTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

42 - Do not allow cross context requestsTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

43 - Do not resolve hosts on logging valves - CONTEXT_XMLTNS Best Practice Jetty 9 LinuxUnix

CONFIGURATION MANAGEMENT

Adtran : Disable SSID BroadcastTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Disable TelnetTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Ensure a trusted, secondary DNS server is setTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Ensure the default 'admin' username is not usedTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Forward logs to syslog serverTNS Adtran AOS Best Practice AuditAdtran

AUDIT AND ACCOUNTABILITY

Adtran : Password Policy - no weak passwordsTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Secure Web Access - HTTP disabledTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Set 'login' BannerTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : SNMPv3 is usedTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

WatchGuard : Authentication Settings - 'Management User Idle Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : DoS Prevention - Block Port Space ProbesTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Drop ICMP Flood AttackTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Drop IPSEC Flood AttackTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : IPS Logging Threat Level Medium - EnabledTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : LDAP Server NameTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION

WatchGuard : Logging - Review Remote Logging Server AddressTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

AUDIT AND ACCOUNTABILITY

WatchGuard : SNMP Configuration - community string - 'private'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

IDENTIFICATION AND AUTHENTICATION