Item Search

NameAudit NamePluginCategory
1.8.1 Ensure 'console session timeout' is less than or equal to '5' minutesCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL

1.8.3 Ensure 'HTTP session timeout' is less than or equal to '5' minutesCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.10.6 Ensure 'logging history severity level' is set to greater than or equal to '5'CIS Cisco Firewall v8.x L1 v4.2.0Cisco

AUDIT AND ACCOUNTABILITY

1.13.5 Ensure 'Allow Active X One Off Forms' is set to Enabled:Load only Outlook ControlsCIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 7 L2 v1.1.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 8 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 10 L2 v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 8 L2 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 9 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.4 Disable X-Powered-By HTTP Header and Rename the Server Value for all ConnectorsCIS Apache Tomcat 10.1 v1.1.0 L2Unix

CONFIGURATION MANAGEMENT

3.1.3 - AirWatch - Set the 'minimum password length'AirWatch - CIS Apple iOS 8 v1.0.0 L1MDM

IDENTIFICATION AND AUTHENTICATION

3.2.9 Set archive log failover retry limitCIS IBM DB2 9 Benchmark v3.0.1 Level 2 DBIBM_DB2DB
5.3.3 Ensure password reuse is limitedCIS Debian Family Server L1 v1.0.0Unix

ACCESS CONTROL

5.16 Ensure Browser Framing Is RestrictedCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

89.32 (L1) Ensure 'Replace Process Level Token' is set to 'LOCAL SERVICE, NETWORK SERVICE'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AIOS-02-090100 - Apple iOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-02-090100 - Apple iOS must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

AIOS-15-011000 - Apple iOS/iPadOS 15 must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-15-011000 - Apple iOS/iPadOS 15 must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT

AIOS-18-011000 - Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-18-011000 - Apple iOS/iPadOS 18 must implement the management setting: disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIX7-00-002129 - If Bourne / ksh shell is used, AIX must display logout messages.DISA STIG AIX 7.x v3r1Unix

ACCESS CONTROL

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT MSCT Windows Server 2022 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 10 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows Server 1903 DC v1.19.9Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server v20H2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 1903 MS v1.19.9Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2019 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows 10 1909 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

APPNET0075 - Disable TLS RC4 cipher in .NetDISA STIG for Microsoft Dot Net Framework 4.0 v2r4Windows

CONFIGURATION MANAGEMENT

BIND-9X-001510 - A BIND 9.x server implementation must enforce approved authorizations for controlling the flow of information between authoritative name servers and specified secondary name servers based on DNSSEC policies.DISA BIND 9.x STIG v2r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

CIS_Cisco_Firewall_v8.x_Level_1_v4.2.0.audit for Cisco ASA 8 from CIS Cisco Firewall v8.x Benchmark v4.2.0CIS Cisco Firewall v8.x L1 v4.2.0Cisco
DTAVSEL-013 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-106 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-106 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Clean infected files automatically as first action when a virus or Trojan is detected.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Enable EDR in block modeMSCT Windows 11 v24H2 v1.0.0Windows
GEN005180 - All .Xauthority files must have mode 0600 or less permissive.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

MADB-10-004400 - MariaDB must use NIST FIPS 140-2 validated cryptographic modules for cryptographic operations.DISA MariaDB Enterprise 10.x v2r3 OS LinuxUnix

IDENTIFICATION AND AUTHENTICATION

MD3X-00-000330 - If passwords are used for authentication, MongoDB must store only hashed, salted representations of passwords.DISA STIG MongoDB Enterprise Advanced 3.x v2r3 OSUnix

IDENTIFICATION AND AUTHENTICATION

Rackspace Database Backups - Every DB instance backed up since the last scan.Tenable Best Practices RackSpace v2.0.0Rackspace

CONTINGENCY PLANNING

TCAT-AS-001030 - LockOutRealms failureCount attribute must be set to 5 failed logins for admin users.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

ACCESS CONTROL

XenServer - Auto-start is not enabledTNS Citrix XenServerUnix