Item Search

NameAudit NamePluginCategory
5.5.1.7 Ensure password expiration is 60 Day maximum for new usersCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Work Profile Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Work profile notifications while device lockedTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

DKER-EE-002070 - The Docker Enterprise default seccomp profile must not be disabled.DISA STIG Docker Enterprise 2.x Linux/Unix v2r2Unix

CONFIGURATION MANAGEMENT

Ensure 'console session timeout' is set to organizational policyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'Failover' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Integrity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'logging buffer size' is greater than or equal to '524288' bytes (512kb)Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging trap severity ' is greater than or equal to '5'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'OSPF authentication' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

IDENTIFICATION AND AUTHENTICATION

Ensure 'Password Policy' is enabled - minimum-lengthTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

IDENTIFICATION AND AUTHENTICATION

Ensure 'SNMP traps' is enabled - authenticationTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'SSH source restriction' is set to an authorized IP addressTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure intrusion prevention is enabled for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure known default accounts do not exist - cmd_execTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

IBM i : Block Password Change (QPWDCHGBLK) - '>=48'IBM System i Security Reference for V7R3AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Password Expiration Warning (QPWDEXPWRN) - '<=14'IBM System i Security Reference for V7R2AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Password Expiration Warning (QPWDEXPWRN) - '<=14'IBM System i Security Reference for V7R3AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Restricted Characters for Passwords (QPWDLMTCHR)IBM System i Security Reference for V7R3AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Retain Server Security (QRETSVRSEC) - '1'IBM System i Security Reference for V7R2AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Scan File Systems (QSCANFS) - '*ROOTOPNUD'IBM System i Security Reference for V7R1 and V6R1AS/400

CONFIGURATION MANAGEMENT

IBM i : Share Memory Control (QSHRMEMCTL) - '1'IBM System i Security Reference for V7R1 and V6R1AS/400

SYSTEM AND INFORMATION INTEGRITY

IBM i : Share Memory Control (QSHRMEMCTL) - '1'IBM System i Security Reference for V7R2AS/400

SYSTEM AND INFORMATION INTEGRITY

IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAMEIBM System i Security Reference for V7R2AS/400

ACCESS CONTROL

IBM i : Use Adopted Authority (QUSEADPAUT) - AUTH_LIST_NAMEIBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

iOS Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - AirDropTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - CameraTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Changes to app cellular data usage settingsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Game CenterTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Maximum minutes after screen lock before password is requiredTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Passcode modificationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - PasswordTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Prevent reuse of previous passwordsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Required password typeTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Share usage dataTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Today view while device lockedTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Wallet notifications while device lockedTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Compliance Policy - Maximum minutes of inactivity before password is requiredTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Compliance Policy - Required password typeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

macOS Compliance Policy - Simple passwords.Tenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Maximum minutes after screen lock before password is requiredTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Prevent reuse of previous passwordsTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

macOS Device Management - Required password typeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Removable storageTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Required password typeTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Scan scripts loaded in Microsoft web browsersTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT