Item Search

NameAudit NamePluginCategory
1.1.27 Disable AutomountingCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

MEDIA PROTECTION

3.1.6 Restrict Published Information (if publishing is required) - publish-address=noCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

18.7.3 (L1) Ensure 'Configure RPC connection settings: Protocol to use for outgoing RPC connections' is set to 'Enabled: RPC over TCP'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.7.3 (L1) Ensure 'Configure RPC connection settings: Protocol to use for outgoing RPC connections' is set to 'Enabled: RPC over TCP'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.7.3 (L1) Ensure 'Configure RPC connection settings: Protocol to use for outgoing RPC connections' is set to 'Enabled: RPC over TCP'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.7.4 (L1) Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.7.4 (L1) Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows Server 2022 v4.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.7.4 (L1) Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows Server 2022 Stand-alone v1.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.7.4 (L1) Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.7.4 (L1) Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.7.4 Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

CONFIGURATION MANAGEMENT

18.7.4 Ensure 'Configure RPC connection settings: Use authentication for outgoing RPC connections' is set to 'Enabled: Default'CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.7.5 (L1) Ensure 'Configure RPC listener settings: Protocols to allow for incoming RPC connections' is set to 'Enabled: RPC over TCP'CIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.7.5 (L1) Ensure 'Configure RPC listener settings: Protocols to allow for incoming RPC connections' is set to 'Enabled: RPC over TCP'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.7.5 (L1) Ensure 'Configure RPC listener settings: Protocols to allow for incoming RPC connections' is set to 'Enabled: RPC over TCP'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.7.6 (L1) Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

18.7.6 (L1) Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION

18.7.6 (L1) Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows Server 2022 v4.0.0 L1 DCWindows

IDENTIFICATION AND AUTHENTICATION

18.7.6 (L1) Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

IDENTIFICATION AND AUTHENTICATION

18.7.6 (L1) Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

18.7.6 (L1) Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

IDENTIFICATION AND AUTHENTICATION

18.7.6 Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

IDENTIFICATION AND AUTHENTICATION

18.7.6 Ensure 'Configure RPC listener settings: Authentication protocol to use for incoming RPC connections:' is set to 'Enabled: Negotiate' or higherCIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

IDENTIFICATION AND AUTHENTICATION

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows Server 2022 v4.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows Server 2025 v1.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.7.7 (L1) Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.7.7 Ensure 'Configure RPC over TCP port' is set to 'Enabled: 0'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.10.18.1 (L2) Ensure 'Enable App Installer' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.18.1 (L2) Ensure 'Enable App Installer' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.10.18.1 (L2) Ensure 'Enable App Installer' is set to 'Disabled'CIS Microsoft Windows Server 2022 Stand-alone v1.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.18.6 (L1) Ensure 'Enable App Installer ms-appinstaller protocol' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.18.6 (L1) Ensure 'Enable App Installer ms-appinstaller protocol' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

SOL-11.1-040130 - Systems must employ cryptographic hashes for passwords using the SHA-2 family of algorithms or FIPS 140-2 approved successors.DISA STIG Solaris 11 SPARC v3r1Unix

IDENTIFICATION AND AUTHENTICATION

VM : disable-unexposed-features-protocolhandlerVMWare vSphere 6.5 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-protocolhandlerVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-shellactionVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-shellactionVMWare vSphere 6.5 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unityVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-interlockVMWare vSphere 6.5 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-unityactiveVMWare vSphere 6.5 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-windowcontentsVMWare vSphere 6.5 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-windowcontentsVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-versiongetVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-versionsetVMWare vSphere 6.0 Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-versionsetVMWare vSphere 6.5 Hardening GuideVMware

CONFIGURATION MANAGEMENT

WPAW-00-002100 - The Windows PAW must be configured so that all inbound ports and services to a PAW are blocked except as needed for monitoring, scanning, and management tools or when the inbound communication is a response to an outbound connection request.DISA MS Windows Privileged Access Workstation v3r2Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION