Item Search

NameAudit NamePluginCategory
1.1.3.10.7 Set 'Network access: Remotely accessible registry paths and sub-paths' to the following listCIS Windows 8 L1 v1.0.0Windows

ACCESS CONTROL

1.2.1.12 Ensure 'Add-on Management' is set to Enabled - groove.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.12 Ensure 'Add-on Management' is set to Enabled - msaccess.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.12 Ensure 'Add-on Management' is set to Enabled - mse7.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.12 Ensure 'Add-on Management' is set to Enabled - pptview.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

1.2.1.12 Ensure 'Add-on Management' is set to Enabled - winproj.exeCIS Microsoft Office 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.01 Installation - 'Try to ensure that no other users are connected while installing Oracle 11g'CIS v1.1.0 Oracle 11g OS L1Unix
3.064 - Unauthorized registry paths are remotely accessible.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.1.3.11 Ensure session initiation information is collectedCIS CentOS Linux 8 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS CentOS Linux 8 Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.5.2 Ensure RIP is set to check for zero values in reserved fieldsCIS Juniper OS Benchmark v2.1.0 L1Juniper

CONFIGURATION MANAGEMENT

5.1 (L1) Host firewall must only allow traffic from authorized networksCIS VMware ESXi 8.0 v1.2.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.2.3.11 Ensure session initiation information is collectedCIS Debian 10 Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.11 Ensure session initiation information is collectedCIS CentOS Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Red Hat Enterprise Linux 7 v4.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Oracle Linux 7 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

5.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Oracle Linux 8 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.11 Ensure session initiation information is collectedCIS Debian Linux 12 v1.1.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.11 Ensure session initiation information is collectedCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.11 Ensure session initiation information is collectedCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Debian Linux 12 v1.1.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.11 Ensure session initiation information is collectedCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.11 Ensure session initiation information is collectedCIS SUSE Linux Enterprise 15 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Ubuntu Linux 22.04 LTS v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Red Hat Enterprise Linux 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.4.3.11 Ensure session initiation information is collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.4.3.14 Ensure events that modify the system's Mandatory Access Controls are collectedCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

10.3 Restrict access to the DB2 Health Monitor utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

ACCESS CONTROL

10.4 Restrict access to the DB2 Activity Monitor utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS LinuxUnix

ACCESS CONTROL

10.4 Restrict access to the DB2 Activity Monitor utilityCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

ACCESS CONTROL

12.33 Event and System Logs - 'Monitor'CIS v1.1.0 Oracle 11g OS L1Unix
APPL-11-000015 - The macOS system must utilize an Endpoint Security Solution (ESS) and implement all DoD required modules.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

APPL-11-000015 - The macOS system must utilize an Endpoint Security Solution (ESS) and implement all DoD required modules.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND INFORMATION INTEGRITY

CISC-RT-000930 - The Cisco Multicast Source Discovery Protocol (MSDP) switch must be configured to filter source-active multicast advertisements to external MSDP peers to avoid global visibility of local-only multicast sources and groups.DISA Cisco NX OS Switch RTR STIG v3r3Cisco

ACCESS CONTROL

DTAM148 - McAfee VirusScan Access Protection Rules Anti-Spyware Maximum Protection must be set to block and log execution of scripts from the Temp folder.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM148 - McAfee VirusScan Access Protection: Anti-Spyware Maximum Protection must be set to block and log execution of scripts from the Temp folder.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-109 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x Web UI must be disabled.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

CONFIGURATION MANAGEMENT

FGFW-ND-000305 - The FortiGate device must only install patches or updates that are validated by the vendor via digital signature or hash.DISA Fortigate Firewall NDM STIG v1r4FortiGate

CONFIGURATION MANAGEMENT

MD4X-00-005800 - MongoDB must only accept end entity certificates issued by DoD PKI or DoD-approved PKI Certification Authorities (CAs) for the establishment of all encrypted sessions.DISA STIG MongoDB Enterprise Advanced 4.x v1r4 OSUnix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-020320 - The Red Hat Enterprise Linux operating system must be configured so that all files and directories have a valid owner.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

SHPT-00-000435 - SharePoint must protect audit information from unauthorized modification of usage and health data collection logs.DISA STIG SharePoint 2010 v1r9Windows

AUDIT AND ACCOUNTABILITY

SLES-15-020230 - The SUSE operating system must employ user passwords with a maximum lifetime of 60 days.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000235 - Splunk Enterprise must notify analysts of applicable events for Tier 2 CSSP and JRSS only.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

vCenter : change-default-passwordVMWare vSphere 5.X Hardening GuideVMware
VCSA : change-default-passwordVMWare vSphere 5.X Hardening GuideVMware
VCWN-06-000049 - The system must alert administrators on permission deletion operations.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND INFORMATION INTEGRITY

VCWN-06-000050 - The system must alert administrators on permission update operations.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND INFORMATION INTEGRITY