1.2 (L1) Ensure the Image Profile VIB acceptance level is configured properly | CIS VMware ESXi 7.0 v1.5.0 L1 Bare Metal | Unix | SYSTEM AND SERVICES ACQUISITION |
1.2 Ensure the Image Profile VIB acceptance level is configured properly | CIS VMware ESXi 6.5 v1.0.0 Level 1 Bare Metal | Unix | CONFIGURATION MANAGEMENT |
1.2 Ensure the Image Profile VIB acceptance level is configured properly | CIS VMware ESXi 6.7 v1.3.0 Level 1 Bare Metal | Unix | SYSTEM AND SERVICES ACQUISITION |
8.7.1 Disable VMware Tools auto install | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | CONFIGURATION MANAGEMENT |
Fortigate - Close port TCP 113 on external interface | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | CONFIGURATION MANAGEMENT |
Fortigate - Enable logs of failed connection attempts | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | AUDIT AND ACCOUNTABILITY |
Fortigate - Ensure default admin usernames are not used | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Fortigate - External Logging - 'syslog3' | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | AUDIT AND ACCOUNTABILITY |
Fortigate - Inactivity timeout - 'global' <= 5 | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Fortigate - IPS database - extended | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | SYSTEM AND INFORMATION INTEGRITY |
Fortigate - Password Complexity - 1 lowercase letter | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | IDENTIFICATION AND AUTHENTICATION |
Fortigate - Password Complexity - 4 char difference | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | IDENTIFICATION AND AUTHENTICATION |
Fortigate - Require that passwords expire | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | IDENTIFICATION AND AUTHENTICATION |
Fortigate - reset-sessionless-tcp disabled | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | SYSTEM AND COMMUNICATIONS PROTECTION |
Fortigate - SNMP community string - 'private' | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | IDENTIFICATION AND AUTHENTICATION |
Fortigate - VPN SSL cipher suite > than 128 bits | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
IBM HTTP Server is installed and running on the system | TNS IBM HTTP Server Best Practice | Unix | |
Salesforce.com : AuthConfig - 'Auth Providers = Facebook Consumer Secret' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = Facebook Default Scope' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = MicrosoftACS Default Scope' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Authorize Endpoint URL' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Execution User ID' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Send Access Token in Header' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect User Info Endpoint URL' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce Consumer Key' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce Error URL' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | |
Salesforce.com : Email Services - 'AuthorizationFailureAction != 2' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | CONFIGURATION MANAGEMENT |
Salesforce.com : Email Services - 'IsTlsRequired = True' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | IDENTIFICATION AND AUTHENTICATION |
Salesforce.com : Monitoring Login History - 'No users are password locked' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Object Permissions - 'DefaultCampaignAccess should not be Public Full Access or Public Read/Write' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Object Permissions - 'DefaultPricebookAccess should not be Use' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Password Policies - 'password question cannot contain password' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | IDENTIFICATION AND AUTHENTICATION |
Salesforce.com : Setting Session Security - 'Enable caching and autocomplete = false' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | CONFIGURATION MANAGEMENT |
Salesforce.com : Setting Session Security - 'Enable CSRF protection on POST requests on non-setup pages = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | SYSTEM AND COMMUNICATIONS PROTECTION |
Salesforce.com : Setting Session Security - 'Enable SMS-based identity confirmation = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | IDENTIFICATION AND AUTHENTICATION |
Salesforce.com : Setting Session Security - 'Force logout on timeout = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
Salesforce.com : Setting Session Security - 'PermissionsPasswordNeverExpires = true' | TNS Salesforce Best Practices Audit v1.2.0 | Salesforce.com | ACCESS CONTROL |
vCenter : monitor-admin-assignment | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter: vcenter-8.administration-sso-password-policy | VMware vSphere Security Configuration and Hardening Guide | VMware | IDENTIFICATION AND AUTHENTICATION |
VCUI-80-000134 The vCenter UI service shutdown port must be disabled. | DISA VMware vSphere 8.0 vCenter Appliance User Interface (UI) STIG v2r1 | Unix | CONFIGURATION MANAGEMENT |
VCWN-06-000029 - The system must enable all tasks to be shown to Administrators in the Web Client. | DISA STIG VMware vSphere vCenter 6.x v1r4 | VMware | CONFIGURATION MANAGEMENT |
VCWN-65-000029 - The vCenter Server for Windows must enable all tasks to be shown to Administrators in the Web Client. | DISA STIG VMware vSphere vCenter 6.5 v2r3 | VMware | CONFIGURATION MANAGEMENT |
VMCH-06-000009 - The unexposed feature keyword isolation.tools.ghi.autologon.disable must be set. | DISA STIG VMware vSphere Virtual Machine 6.x v1r1 | VMware | CONFIGURATION MANAGEMENT |
VMCH-06-000013 - The unexposed feature keyword isolation.tools.memSchedFakeSampleStats.disable must be set. | DISA STIG VMware vSphere Virtual Machine 6.x v1r1 | VMware | CONFIGURATION MANAGEMENT |
VMCH-06-000016 - The unexposed feature keyword isolation.tools.dispTopoRequest.disable must be set. | DISA STIG VMware vSphere Virtual Machine 6.x v1r1 | VMware | CONFIGURATION MANAGEMENT |
VMCH-06-000020 - The unexposed feature keyword isolation.tools.unityInterlockOperation.disable must be set. | DISA STIG VMware vSphere Virtual Machine 6.x v1r1 | VMware | CONFIGURATION MANAGEMENT |
VMCH-06-000024 - The unexposed feature keyword isolation.tools.unity.windowContents.disable must be set. | DISA STIG VMware vSphere Virtual Machine 6.x v1r1 | VMware | CONFIGURATION MANAGEMENT |
VMCH-65-000018 - The unexposed feature keyword isolation.tools.ghi.trayicon.disable must be set on the virtual machine. | DISA STIG VMware vSphere Virtual Machine 6.5 v2r2 | VMware | CONFIGURATION MANAGEMENT |
VMCH-65-000019 - The unexposed feature keyword isolation.tools.unity.disable must be set on the virtual machine. | DISA STIG VMware vSphere Virtual Machine 6.5 v2r2 | VMware | CONFIGURATION MANAGEMENT |
VMCH-65-000025 - The unexposed feature keyword isolation.tools.vmxDnDVersionGet.disable must be set on the virtual machine. | DISA STIG VMware vSphere Virtual Machine 6.5 v2r2 | VMware | CONFIGURATION MANAGEMENT |