2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 11 Enterprise v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NG | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLocker | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
4.8 Log successful and failed login attempt - failure | CIS Sybase 15.0 L1 DB v1.1.0 | SybaseDB | |
6.1.2.1.4 Ensure systemd-journal-remote service is not in use | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | CONFIGURATION MANAGEMENT |
17 - Securing NFS - Export policy rules | NetApp Security Hardening Guide for ONTAP 9 v1.7.0 | Netapp_API | |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 1909 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server 2022 v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server v1909 DC v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - Service - AllowBasic | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow Basic authentication - WinRM Service | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 11 v24H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows Server 2025 DC v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 10 1909 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows Server 1903 DC v1.19.9 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows Server v2004 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 10 v2004 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 10 v20H2 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows 10 v21H1 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows Server v20H2 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - Client - AllowUnencryptedTraffic | MSCT Windows Server v1909 MS v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - WinRM Client | MSCT Windows 10 1803 v1.0.0 | Windows | ACCESS CONTROL |
Allow unencrypted traffic - WinRM Client | MSCT Windows Server 2019 MS v1.0.0 | Windows | ACCESS CONTROL |
Audit: Shut down system immediately if unable to log security audits | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | AUDIT AND ACCOUNTABILITY |
Audit: Shut down system immediately if unable to log security audits | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | AUDIT AND ACCOUNTABILITY |
DTAM060 - McAfee VirusScan On-Demand scan log file size must be restricted, but be configured to at least 10MB. - Max log file size | DISA McAfee VirusScan 8.8 Local Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
PANW-NM-000024 - The Palo Alto Networks security platform must generate audit records when successful/unsuccessful attempts to access privileges occur. | DISA STIG Palo Alto NDM v3r3 | Palo_Alto | AUDIT AND ACCOUNTABILITY |
PPS9-00-008100 - The EDB Postgres Advanced Server must provide an immediate real-time alert to appropriate support staff of all audit log failures. | EDB PostgreSQL Advanced Server DB Audit v2r3 | PostgreSQLDB | AUDIT AND ACCOUNTABILITY |
Select cloud protection level | MSCT Windows 10 v20H2 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
SRG-OS-000120-ESXI5 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm. | DISA STIG VMWare ESXi Server 5 STIG v2r1 | VMware | IDENTIFICATION AND AUTHENTICATION |
VCRP-67-000005 - The rhttpproxy must produce log records containing sufficient information to establish the source of events. | DISA STIG VMware vSphere 6.7 RhttpProxy v1r3 | Unix | ACCESS CONTROL |
VCWN-65-000028 - The vCenter Server for Windows Administrators must clean up log files after failed installations. | DISA STIG VMware vSphere vCenter 6.5 v2r3 | VMware | CONFIGURATION MANAGEMENT |
WBLC-02-000065 - Oracle WebLogic must compile audit records from multiple components within the system into a system-wide (logical or physical) audit trail that is time-correlated to within an organization-defined level of tolerance. | Oracle WebLogic Server 12c Windows v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
WN12-00-000180 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client - LanManWorkstation | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-00-000180 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client - LanManWorkstation | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-00-000180 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client - mrxsmb10 | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | CONFIGURATION MANAGEMENT |
WN12-CC-000084 - The Application event log size must be configured to 32768 KB or greater. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | AUDIT AND ACCOUNTABILITY |
WN22-CC-000270 - Windows Server 2022 Application event log size must be configured to 32768 KB or greater. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | AUDIT AND ACCOUNTABILITY |
WN22-CC-000280 - Windows Server 2022 Security event log size must be configured to 196608 KB or greater. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | AUDIT AND ACCOUNTABILITY |
WN22-CC-000380 - Windows Server 2022 Remote Desktop Services must be configured with the client connection encryption set to High Level. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | ACCESS CONTROL |
WNFWA-000017 - Windows Defender Firewall with Advanced Security log size must be configured for private network connections. | DISA Microsoft Windows Firewall v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
WNFWA-000027 - Windows Defender Firewall with Advanced Security log size must be configured for public network connections. | DISA Microsoft Windows Firewall v2r2 | Windows | AUDIT AND ACCOUNTABILITY |