Item Search

NameAudit NamePluginCategory
1.11 Ensure credentials unused for 45 days or more are disabledCIS Amazon Web Services Foundations v5.0.0 L1amazon_aws

ACCESS CONTROL

2.1.1.4 Audit Security Keys Used With AppleIDsCIS Apple macOS 13.0 Ventura v3.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

3.3.1 Avoid use of grant allCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2016 Database L1 AWS RDS v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2017 Database L1 AWS RDS v1.3.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.9 Ensure Windows BUILTIN groups are not SQL LoginsCIS SQL Server 2022 Database L1 DB v1.1.0MS_SQLDB

ACCESS CONTROL, MEDIA PROTECTION

3.12 Ensure Group Write Access for the Document Root Directories and Files Is Properly RestrictedCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

ACCESS CONTROL

9.3 Check That Defined Home Directories ExistCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

9.7 Check Permissions on User Home DirectoriesCIS Solaris 11 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.8 Check Permissions on User '.' (Hidden) FilesCIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.8 Check Permissions on User '.' (Hidden) FilesCIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

9.9 Check Permissions on User .netrc FilesCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.10 Check for Presence of User .rhosts FilesCIS Solaris 11 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.10 Check for Presence of User .rhosts FilesCIS Solaris 11.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

9.10 Check for Presence of User .rhosts FilesCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.10 Check Permissions on User '.' (Hidden) FilesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL, MEDIA PROTECTION

9.12 Check for Presence of User .rhosts FilesCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

9.13 Check Groups in passwdCIS Oracle Solaris 11.4 L1 v1.1.0Unix

ACCESS CONTROL

9.13 Check That Defined Home Directories ExistCIS Solaris 11.1 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.15 Check for Duplicate UIDsCIS Solaris 11 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.15 Check for Duplicate UIDsCIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.15 Check for Duplicate UIDsCIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

9.16 Check for Duplicate UIDsCIS Oracle Solaris 11.4 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

9.17 Check That Reserved UIDs Are Assigned to System AccountsCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

9.18 Check for Duplicate User NamesCIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

Android Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Compliance Policy - Require a password to unlock mobile devicesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - CameraTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Google account auto syncTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - PasswordTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Maximum minutes of inactivity until work profile locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Work Profile Device Configuration - Required password typeTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

EX13-EG-000155 - The Exchange Internet Receive connector connections count must be set to default.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-MB-000450 - The Exchange Outbound Connection Limit per Domain Count must be controlled.DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX19-ED-000119 - The Exchange internet receive connector connections count must be set to default.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 14'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 15'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 20'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 102'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 103'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 104'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 105'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 106'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 107'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 108'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 109'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 110'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 111'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-023300 - SQL Server must notify appropriate individuals when accounts are modified - 'Event ID 130'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL