Item Search

NameAudit NamePluginCategory
1.3 Disable MySQL Command History - .mysql_historyCIS MySQL 5.6 Community Linux OS L2 v2.0.0Unix

MEDIA PROTECTION

1.3 Disable MySQL Command History - ~/.mysql_historyCIS MySQL 5.6 Enterprise Linux OS L2 v2.0.0Unix

MEDIA PROTECTION

4.6 (L1) Host must enable audit record loggingCIS VMware ESXi 8.0 v1.2.0 L1VMware

AUDIT AND ACCOUNTABILITY

Adtran : Device InfoTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Audit system file permissions - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND INFORMATION INTEGRITY

CIS_SUSE_Linux_Enterprise_12_v3.2.1_L1_Workstation.audit from CIS SUSE Linux Enterprise 12 Benchmark v3.2.1CIS SUSE Linux Enterprise 12 v3.2.1 L1 WorkstationUnix
CIS_SUSE_Linux_Enterprise_12_v3.2.1_L2_Server.audit from CIS SUSE Linux Enterprise 12 Benchmark v3.2.1CIS SUSE Linux Enterprise 12 v3.2.1 L2 ServerUnix
CIS_SUSE_Linux_Enterprise_12_v3.2.1_L2_Workstation.audit from CIS SUSE Linux Enterprise 12 Benchmark v3.2.1CIS SUSE Linux Enterprise 12 v3.2.1 L2 WorkstationUnix
CIS_SUSE_Linux_Enterprise_15_v2.0.0_L1_Workstation.audit from CIS SUSE Linux Enterprise 15 Benchmark v2.0.0CIS SUSE Linux Enterprise 15 v2.0.0 L1 WorkstationUnix
CIS_SUSE_Linux_Enterprise_15_v2.0.0_L2_Server.audit from CIS SUSE Linux Enterprise 15 Benchmark v2.0.0CIS SUSE Linux Enterprise 15 v2.0.0 L2 ServerUnix
CIS_SUSE_Linux_Enterprise_Server_11_v2.1.1_L1.audit from CIS SUSE Linux Enterprise 11 BenchmarkCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix
CIS_SUSE_Linux_Enterprise_Server_11_v2.1.1_L2.audit from CIS SUSE Linux Enterprise 11 BenchmarkCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix
CIS_SUSE_Linux_Enterprise_Workstation_11_v2.1.1_L1.audit from CIS SUSE Linux Enterprise 11 BenchmarkCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix
CIS_SUSE_Linux_Enterprise_Workstation_11_v2.1.1_L2.audit from CIS SUSE Linux Enterprise 11 BenchmarkCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix
DTAVSEL-008 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to scan files when being written to disk.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-015 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to Clean infected files automatically as first action when programs and jokes are found.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-100 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to run a scheduled On-Demand scan at least once a week.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Ensure Avahi Server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure DNS Server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure FTP Server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure GDM login banner is configured - banner-message-textTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure GDM login banner is configured - file-dbTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure IPv6 redirects are not accepted - /etc/sysctl ipv6 all acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure IPv6 redirects are not accepted - /etc/sysctl ipv6 default acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure IPv6 router advertisements are not accepted - /etc/sysctl ipv6 all acceptTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure LDAP client is not installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure NIS Client is not installed - rpmTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure Reverse Path Filtering is enabled - /etc/sysctl ipv4 default rp_filterTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure Reverse Path Filtering is enabled - sysctl ipv4 all rp_filterTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure Reverse Path Filtering is enabled - sysctl ipv4 default rp_filterTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure SNMP Server is not enabledTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Ensure SSH Idle Timeout Interval is configured - ClientAliveIntervalTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure SSH MaxAuthTries is set to 4 or lessTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Ensure TCP Wrappers is installed - zypperTenable Cisco Firepower Management Center OS Best Practices AuditUnix

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-003031 - A DoD-approved third party Exchange-aware malicious code protection application must be implemented.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000730 - The application must configure malicious code protection mechanisms to perform periodic scans of the information system every seven days.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-000760 - The application must be configured to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND INFORMATION INTEGRITY

EX16-ED-002410 - The application must update malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r6Windows

SYSTEM AND INFORMATION INTEGRITY

IBM i : Auditing Force Level (QAUDFRCLVL) - '*SYS'IBM System i Security Reference for V7R3AS/400

AUDIT AND ACCOUNTABILITY

IBM i : Automatic Device Configuration (QAUTOCFG) - '0'IBM System i Security Reference for V7R1 and V6R1AS/400

CONFIGURATION MANAGEMENT

IBM i : Device Recovery Action (QDEVRCYACN) - '*DSCMSG'IBM System i Security Reference for V7R2AS/400

CONFIGURATION MANAGEMENT

IBM i : Limit Security Officer (QLMTSECOFR) - '1'IBM System i Security Reference for V7R1 and V6R1AS/400

ACCESS CONTROL

IBM i : Limit Security Officer (QLMTSECOFR) - '1'IBM System i Security Reference for V7R3AS/400

ACCESS CONTROL

IBM i : Password Expiration Warning (QPWDEXPWRN) - '<=14'IBM System i Security Reference for V7R1 and V6R1AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Remote Service Attribute (QRMTSRVATR) - '0'IBM System i Security Reference for V7R3AS/400

CONFIGURATION MANAGEMENT

IBM i : Restricted Characters for Passwords (QPWDLMTCHR)IBM System i Security Reference for V7R2AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Retain Server Security (QRETSVRSEC) - '0'IBM System i Security Reference for V7R1 and V6R1AS/400

IDENTIFICATION AND AUTHENTICATION

IBM i : Scan File Systems (QSCANFS) - '*ROOTOPNUD'IBM System i Security Reference for V7R3AS/400

CONFIGURATION MANAGEMENT

IBM i : Share Memory Control (QSHRMEMCTL) - '1'IBM System i Security Reference for V7R3AS/400

SYSTEM AND INFORMATION INTEGRITY

SLES-15-040220 - The SUSE operating system must be configured to not overwrite Pluggable Authentication Modules (PAM) configuration on package changes.DISA SUSE Linux Enterprise Server 15 STIG v2r4Unix

CONFIGURATION MANAGEMENT