1.1 Ensure Latest SQL Server Service Packs and Hotfixes are Installed | CIS SQL Server 2012 Database L1 DB v1.6.0 | MS_SQLDB | CONFIGURATION MANAGEMENT |
1.98 (L2) Ensure 'Enable search suggestions' is set to 'Disabled' | CIS Microsoft Edge v3.0.0 L2 | Windows | CONFIGURATION MANAGEMENT |
2.2.2 Ensure ldap client is not installed | CIS SUSE Linux Enterprise 15 v2.0.1 L2 Workstation | Unix | CONFIGURATION MANAGEMENT |
2.3.9.5 Ensure 'Microsoft network server: Server SPN target name validation level' is set to 'Accept if provided by client' or higher | CIS Microsoft Windows 8.1 v2.4.1 L1 | Windows | CONFIGURATION MANAGEMENT |
2.11 (L1) Ensure 'Allow download restrictions' is set to 'Enabled: Block malicious downloads' | CIS Google Chrome L1 v3.0.0 | Windows | AUDIT AND ACCOUNTABILITY |
2.17 Ensure 'clr strict security' Server Configuration Option is set to '1' | CIS Microsoft SQL Server 2019 v1.5.0 L1 AWS RDS | MS_SQLDB | CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION |
4.2.2.1.4 Ensure journald is not configured to receive logs from a remote client | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
5.1.2.1.4 Ensure journald is not configured to receive logs from a remote client | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
5.1.2.1.4 Ensure journald is not configured to receive logs from a remote client | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
5.1.2.1.4 Ensure journald is not configured to receive logs from a remote client | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
5.1.2.1.4 Ensure journald is not configured to receive logs from a remote client | CIS Red Hat EL8 Workstation L1 v3.0.0 | Unix | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT |
5.21 Do not disable default seccomp profile | CIS Docker 1.11.0 v1.0.0 L1 Docker | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
5.124 - Client computers required to authenticate for RPC communication. | DISA Windows Vista STIG v6r41 | Windows | IDENTIFICATION AND AUTHENTICATION |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS SUSE Linux Enterprise 15 v2.0.1 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS SUSE Linux Enterprise 15 v2.0.1 L1 Server | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
6.2.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
8.14 (L1) VMware Tools must send VMware Tools logs to the system log service | CIS VMware ESXi 8.0 v1.2.0 L1 | VMware | AUDIT AND ACCOUNTABILITY |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server 1903 MS v1.19.9 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server v1909 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 v21H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server v2004 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT MSCT Windows Server 2022 DC v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server v20H2 DC v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - WinRM Service | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - WinRM Service | MSCT Windows 10 1809 v1.0.0 | Windows | ACCESS CONTROL |
DKER-EE-001810 - On Linux, a non-AUFS storage driver in the Docker Engine - Enterprise component of Docker Enterprise must be used. | DISA STIG Docker Enterprise 2.x Linux/Unix v2r2 | Unix | CONFIGURATION MANAGEMENT |
DTAM059 - McAfee VirusScan On-Demand scan must be configured to record scanning activity in a log file. | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
ESXI5-VMNET-000010 - All port groups must be configured to a value other than that of the native VLAN. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |
ESXI5-VMNET-000011 - All port groups must not be configured to VLAN 4095 except for Virtual Guest Tagging (VGT) - VGT | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | CONFIGURATION MANAGEMENT |
EX16-MB-000600 - Exchange services must be documented and unnecessary services must be removed or disabled. | DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6 | Windows | CONFIGURATION MANAGEMENT |
EX19-MB-000198 - Exchange services must be documented, and unnecessary services must be removed or disabled. | DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2 | Windows | CONFIGURATION MANAGEMENT |
Firewall Filter - Permit only required protocols from authorized sources | Juniper Hardening JunOS 12 Devices Checklist | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
Microsoft network client: Digitally sign communications (if server agrees) | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Microsoft network client: Digitally sign communications (if server agrees) | MSCT Windows 10 v1507 v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Microsoft network client: Digitally sign communications (if server agrees) | MSCT Windows Server 2016 DC v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
Microsoft network client: Digitally sign communications (if server agrees) | MSCT Windows Server 2016 MS v1.0.0 | Windows | IDENTIFICATION AND AUTHENTICATION |
SonicWALL - Security Services - Gateway AV - TCP Stream Inbound | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND INFORMATION INTEGRITY |
WN10-CC-000290 - Remote Desktop Services must be configured with the client connection encryption set to the required level. | DISA Microsoft Windows 10 STIG v3r4 | Windows | ACCESS CONTROL, MAINTENANCE |
WN11-CC-000290 - Remote Desktop Services must be configured with the client connection encryption set to the required level. | DISA Microsoft Windows 11 STIG v2r3 | Windows | ACCESS CONTROL |
WN12-CC-000100 - Remote Desktop Services must be configured with the client connection encryption set to the required level. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL, MAINTENANCE |
WN12-SO-000030 - Unencrypted passwords must not be sent to third-party SMB Servers. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | IDENTIFICATION AND AUTHENTICATION |