Item Search

NameAudit NamePluginCategory
2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.6 (L1) Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.6 Ensure 'Allow log on through Remote Desktop Services' is set to 'Administrators, Remote Desktop Users'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT

2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

IDENTIFICATION AND AUTHENTICATION

2.11 Ensure Unnecessary SQL Server Protocols are set to 'Disabled' - 'TCP/IP protocol is disabled'CIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

SYSTEM AND INFORMATION INTEGRITY

2.11 Ensure Unnecessary SQL Server Protocols are set to 'Disabled' - 'VIA protocol is disabled'CIS SQL Server 2008 R2 DB OS L1 v1.7.0Windows

SYSTEM AND INFORMATION INTEGRITY

4.8 Log successful and failed login attempt - successCIS Sybase 15.0 L1 DB v1.1.0SybaseDB
6.1.2.1.4 Ensure systemd-journal-remote service is not in useCIS Debian Linux 12 v1.1.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

6.1.2.1.4 Ensure systemd-journal-remote service is not in useCIS Debian Linux 12 v1.1.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

6.1.2.1.4 Ensure systemd-journal-remote service is not in useCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

6.2.3.1 Ensure rsyslog is installedCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

6.2.3.1 Ensure rsyslog is installedCIS Rocky Linux 9 v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.1 Ensure rsyslog is installedCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.2.3.1 Ensure rsyslog is installedCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

18.10.57.2.2 (L2) Ensure 'Disable Cloud Clipboard integration for server-to-client data transfer' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L2 BitLockerWindows

CONFIGURATION MANAGEMENT

18.10.57.2.2 (L2) Ensure 'Disable Cloud Clipboard integration for server-to-client data transfer' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

18.10.57.2.2 (L2) Ensure 'Disable Cloud Clipboard integration for server-to-client data transfer' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L2 BLWindows

CONFIGURATION MANAGEMENT

18.10.57.2.2 (L2) Ensure 'Disable Cloud Clipboard integration for server-to-client data transfer' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT MSCT Windows Server 2022 DC v1.0.0Windows

ACCESS CONTROL

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT Windows 10 v21H2 v1.0.0Windows

ACCESS CONTROL

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT Windows Server v2004 DC v1.0.0Windows

ACCESS CONTROL

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT Windows Server 2016 MS v1.0.0Windows

ACCESS CONTROL

Allow unencrypted traffic - Client - AllowUnencryptedTrafficMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

Allow unencrypted traffic - WinRM ClientMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

DISA_STIG_McAfee_VSEL_1.9.x_2.0.x_Managed_Client_v1r5.audit from DISA McAfee VSEL 1.9/2.0 Managed Client v1r5 STIGMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix
Select cloud protection levelMSCT Windows Server v20H2 MS v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Select cloud protection levelMSCT Windows 10 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Select cloud protection levelMSCT Windows 10 v21H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

WN12-CC-000084 - The Application event log size must be configured to 32768 KB or greater.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-CC-000085 - The Security event log size must be configured to 196608 KB or greater.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-CC-000085 - The Security event log size must be configured to 196608 KB or greater.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-CC-000086 - The Setup event log size must be configured to 32768 KB or greater.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-CC-000086 - The Setup event log size must be configured to 32768 KB or greater.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-CC-000087 - The System event log size must be configured to 32768 KB or greater.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN12-CC-000087 - The System event log size must be configured to 32768 KB or greater.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

AUDIT AND ACCOUNTABILITY

WN16-CC-000300 - The Application event log size must be configured to 32768 KB or greater.DISA Microsoft Windows Server 2016 STIG v2r10Windows

AUDIT AND ACCOUNTABILITY

WN16-CC-000310 - The Security event log size must be configured to 196608 KB or greater.DISA Microsoft Windows Server 2016 STIG v2r10Windows

AUDIT AND ACCOUNTABILITY

WN16-CC-000320 - The System event log size must be configured to 32768 KB or greater.DISA Microsoft Windows Server 2016 STIG v2r10Windows

AUDIT AND ACCOUNTABILITY

WN19-CC-000270 - Windows Server 2019 Application event log size must be configured to 32768 KB or greater.DISA Microsoft Windows Server 2019 STIG v3r4Windows

AUDIT AND ACCOUNTABILITY

WN19-CC-000280 - Windows Server 2019 Security event log size must be configured to 196608 KB or greater.DISA Microsoft Windows Server 2019 STIG v3r4Windows

AUDIT AND ACCOUNTABILITY

WN19-CC-000290 - Windows Server 2019 System event log size must be configured to 32768 KB or greater.DISA Microsoft Windows Server 2019 STIG v3r4Windows

AUDIT AND ACCOUNTABILITY

WN22-CC-000290 - Windows Server 2022 System event log size must be configured to 32768 KB or greater.DISA Microsoft Windows Server 2022 STIG v2r4Windows

AUDIT AND ACCOUNTABILITY