Item Search

NameAudit NamePluginCategory
1.10.5 Ensure 'logging history severity level' is set to greater than or equal to '5'CIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.12 Ensure Maximum number of failed attempts allowed is set to 5 or fewerCIS Check Point Firewall L1 v1.1.0CheckPoint

ACCESS CONTROL

3.1.3 - AirWatch - Set the 'minimum password length'AirWatch - CIS Apple iOS 9 v1.0.0 L1MDM

IDENTIFICATION AND AUTHENTICATION

3.1.3 - MobileIron - Set the 'minimum password length'MobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

IDENTIFICATION AND AUTHENTICATION

3.1.3 - MobileIron - Set the 'minimum password length'MobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

IDENTIFICATION AND AUTHENTICATION

3.3.2.2 Set 'ip ospf message-digest-key md5'CIS Cisco IOS 15 L2 v4.1.1Cisco

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.2 Configure CDPCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.3 Ensure password reuse is limitedCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.3 Ensure password reuse is limitedCIS Debian Family Workstation L1 v1.0.0Unix

ACCESS CONTROL

5.3.3 Ensure password reuse is limitedCIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

IDENTIFICATION AND AUTHENTICATION

5.3.4 Ensure password reuse is limitedCIS Fedora 19 Family Linux Server L1 v1.0.0Unix

ACCESS CONTROL

5.4.4 Ensure password reuse is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

5.4.4 Ensure password reuse is limitedCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS 12 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-12-011200 - Apple iOS must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS 12 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-13-011200 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-13-011200 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 13 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-14-009400 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-14-009400 - Apple iOS/iPadOS must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-16-011000 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 16 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-16-011000 - Apple iOS/iPadOS 16 must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-17-011000 - Apple iOS/iPadOS 17 must implement the management setting: Disable Allow MailDrop.AirWatch - DISA Apple iOS/iPadOS 17 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 11 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Internet ZoneMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT MSCT Windows Server 2022 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server v20H2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Allow only approved domains to use the TDC ActiveX control - Restricted Sites ZoneMSCT Windows Server 2025 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Big Sur - Enforce Session Lock After Screen Saver is StartedNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Big Sur - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Big Sur - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

IDENTIFICATION AND AUTHENTICATION

BIND-9X-001702 - The BIND 9.x server implementation must prohibit the forwarding of queries to servers controlled by organizations outside of the U.S. Government.DISA BIND 9.x STIG v2r3Unix

CONFIGURATION MANAGEMENT

Catalina - Enforce Session Lock After Screen Saver is StartedNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Catalina - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

IDENTIFICATION AND AUTHENTICATION

Catalina - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION

CIS_Red_Hat_EL5_v2.2.1_L1.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix
CIS_Red_Hat_EL5_v2.2.1_L2.audit from Red Hat Enterprise Linux 5 BenchmarkCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA Cisco NX OS Switch NDM STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi: esxi-8.account-lockoutVMware vSphere Security Configuration and Hardening GuideVMware

ACCESS CONTROL

GEN003800 - Inetd or xinetd logging/tracing must be enabled.DISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

Monterey - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Monterey v1.0.0 - All ProfilesUnix

IDENTIFICATION AND AUTHENTICATION

Monterey - Prohibit Password Reuse for a Minimum of Five GenerationsNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000061 - OHS must have a SSL log format defined for log records that allow the establishment of the source of events.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY