Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Policies
Overview
Search
AWS Resources
Azure Resources
GCP Resources
Kubernetes Resources
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 3 of 25
• 1207 Total
Next
Next ››
Name
Audit Name
Plugin
Category
CASA-VN-000230 - The Cisco ASA must be configured to use FIPS-validated SHA-2 at 384 bits or higher for Internet Key Exchange (IKE) Phase 1 - IKE Phase 1.
DISA STIG Cisco ASA VPN v1r2
Cisco
CASA-VN-000230 - The Cisco ASA must be configured to use FIPS-validated SHA-2 or higher for Internet Key Exchange (IKE) Phase 1.
DISA STIG Cisco ASA VPN v1r1
Cisco
CISC-RT-000040 - The Cisco router must be configured to use encryption for routing protocol authentication - EIGRP
DISA STIG Cisco IOS Router RTR v1r4
Cisco
CISC-RT-000040 - The Cisco switch must be configured to use encryption for routing protocol authentication - bgp
DISA STIG Cisco IOS Switch RTR v1r1
Cisco
CISC-RT-000040 - The Cisco switch must be configured to use encryption for routing protocol authentication - eigrp
DISA STIG Cisco IOS Switch RTR v1r1
Cisco
CISC-RT-000040 - The Cisco switch must be configured to use encryption for routing protocol authentication - eigrp
DISA STIG Cisco NX-OS Switch RTR v1r1
Cisco
FGFW-ND-000255 - The FortiGate device must use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
DISA Fortigate Firewall NDM STIG v1r3
FortiGate
JUEX-NM-000340 - The Juniper EX switch must be configured to use FIPS 140-2 approved algorithms for authentication to a cryptographic module.
DISA Juniper EX Series Network Device Management v1r4
Juniper
MADB-10-004400 - MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. - fips_enabled
DISA MariaDB Enterprise 10.x v1r2 OS Linux
Unix
MADB-10-004400 - MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations. - version_ssl_library
DISA MariaDB Enterprise 10.x v1r2 DB
MySQLDB
OL08-00-010159 - The OL 8 'pam_unix.so' module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication - pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Oracle Linux 8 STIG v1r7
Unix
OL08-00-010160 - The OL 8 'pam_unix.so' module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication - pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Oracle Linux 8 STIG v1r8
Unix
OL08-00-010160 - The OL 8 'pam_unix.so' module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication - pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-010160 - The OL 8 'pam_unix.so' module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication - pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010160 - The OL 8 'pam_unix.so' module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-010161 - OL 8 must prevent system daemons from using Kerberos for authentication.
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010162 - The krb5-workstation package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-010162 - The krb5-workstation package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-010162 - The krb5-workstation package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-010162 - The krb5-workstation package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r8
Unix
OL08-00-010162 - The krb5-workstation package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r4
Unix
OL08-00-010163 - The krb5-server package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r7
Unix
OL08-00-010163 - The krb5-server package must not be installed on OL 8.
DISA Oracle Linux 8 STIG v1r6
Unix
RHEL-08-010159 - The RHEL 8 pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r7
Unix
RHEL-08-010159 - The RHEL 8 pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r8
Unix
RHEL-08-010159 - The RHEL 8 pam_unix.so module must be configured in the system-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r13
Unix
RHEL-08-010160 - The RHEL 8 pam_unix.so module must be configured in the password-auth file to use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r7
Unix
RHEL-08-010160 - The RHEL 8 pam_unix.so module must use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. - password-auth
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
RHEL-08-010160 - The RHEL 8 pam_unix.so module must use a FIPS 140-2 approved cryptographic hashing algorithm for system authentication. - system-auth
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
RHEL-08-010161 - RHEL 8 must prevent system daemons from using Kerberos for authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r1
Unix
RHEL-08-010161 - RHEL 8 must prevent system daemons from using Kerberos for authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r3
Unix
RHEL-08-010161 - RHEL 8 must prevent system daemons from using Kerberos for authentication.
DISA Red Hat Enterprise Linux 8 STIG v1r7
Unix
RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8.
DISA Red Hat Enterprise Linux 8 STIG v1r7
Unix
RHEL-08-010162 - The krb5-workstation package must not be installed on RHEL 8.
DISA Red Hat Enterprise Linux 8 STIG v1r9
Unix
RHEL-09-672025 - RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
DISA Red Hat Enterprise Linux 9 STIG v1r1
Unix
RHEL-09-672025 - RHEL 9 must use mechanisms meeting the requirements of applicable federal laws, executive orders, directives, policies, regulations, standards, and guidance for authentication to a cryptographic module.
DISA Red Hat Enterprise Linux 9 STIG v1r2
Unix
SLES-15-010250 - The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (system-auth).
DISA SLES 15 STIG v1r3
Unix
SLES-15-010260 - The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).
DISA SLES 15 STIG v1r11
Unix
SLES-15-010260 - The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).
DISA SLES 15 STIG v1r6
Unix
SLES-15-010260 - The SUSE operating system must employ FIPS 140-2 approved cryptographic hashing algorithm for system authentication (login.defs).
DISA SLES 15 STIG v1r10
Unix
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - inputs.conf ciphersuite
DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS
Unix
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - inputs.conf sslVersions
DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS
Unix
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - server.conf ecdhCurves
DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS
Unix
SPLK-CL-000430 - Splunk Enterprise must use TLS 1.2 and SHA-2 or higher cryptographic algorithms. - server.conf sslVersions
DISA STIG Splunk Enterprise 8.x for Linux v1r3 STIG OS
Unix
UBTU-20-010404 - The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
DISA STIG Ubuntu 20.04 LTS v1r9
Unix
UBTU-20-010404 - The Ubuntu operating system must encrypt all stored passwords with a FIPS 140-2 approved cryptographic hashing algorithm.
DISA STIG Ubuntu 20.04 LTS v1r10
Unix
WN11-SO-000190 - Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
DISA Windows 11 STIG v1r2
Windows
WN11-SO-000190 - Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
DISA Windows 11 STIG v1r4
Windows
WN11-SO-000190 - Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
DISA Windows 11 STIG v1r1
Windows
WN22-SO-000290 - Windows Server 2022 Kerberos encryption types must be configured to prevent the use of DES and RC4 encryption suites.
DISA Windows Server 2022 STIG v1r4
Windows
‹‹ Previous
Previous
Page 3 of 25
• 1207 Total
Next
Next ››