Item Search

NameAudit NamePluginCategory
1.2.3 Ensure HTTP and Telnet options are disabled for the management interfaceCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.5 Ensure valid certificate is set for browser-based administrator interface - Authentication ProfileCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.5 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.2.5 Ensure valid certificate is set for browser-based administrator interface - CertificatesCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.1 Ensure 'V3' is selected for SNMP pollingCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.1.6 Ensure rsh server is not enabled - rexecCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rexecCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS CentOS 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rloginCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Oracle Linux 6 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS CentOS 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.6 Ensure rsh server is not enabled - rshCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.8 Ensure telnet server is not enabledCIS Distribution Independent Linux Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.1.8 Ensure telnet server is not enabledCIS Distribution Independent Linux Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

2.4.5 Ensure only encrypted access channels are enabledCIS Fortigate 7.0.x v1.3.0 L1FortiGate

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.4 Ensure SSH Protocol is set to 2CIS Google Container-Optimized OS v1.2.0 L1 ServerUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.29 Ensure SSH Protocol is set to 2CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.29 Ensure SSH Protocol is set to 2CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

18.9.98.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT

18.9.98.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L2Windows

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION, RISK ASSESSMENT