Item Search

NameAudit NamePluginCategory
1.3.4 Ensure 'User owned apps and services' is restrictedCIS Microsoft 365 Foundations E3 L1 v3.1.0microsoft_azure

CONFIGURATION MANAGEMENT

1.4.7.2.6 Ensure 'Require That Application Add-ins are Signed By Trusted Publisher' is set to EnabledCIS Microsoft Office Excel 2013 v1.0.1Windows

SYSTEM AND INFORMATION INTEGRITY

2.2.24 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.2.27 Ensure 'Deny log on as a batch job' to include 'Guests, Enterprise Admins Group, and Domain Admins Group' (STIG MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.1.3 Ensure 'Accounts: Guest account status' is set to 'Disabled' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION

5.2 Ensure 'Peer Name Resolution Protocol (PNRPsvc)' is set to 'Not Installed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

18.9.47.5.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configured - 75668c1f-73b5-4cf0-bb93-3ecf5cb7cc84CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.47.5.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configured - 26190899-1602-49e8-8b27-eb1d0a1ce869CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.47.5.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configured - d3e037e1-3eb8-44c8-a917-57927947596dCIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.6.1.2 (L1) Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configuredCIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.6.1.2 (L1) Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configuredCIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.6.1.2 (L1) Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configuredCIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.6.1.2 Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configuredCIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.6.1.2 (L1) Ensure 'Configure Attack Surface Reduction rules: Set the state for each ASR rule' is configuredCIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

20.45 Ensure 'Outdated or unused accounts are removed or disabled'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.45 Ensure 'Outdated or unused accounts are removed or disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.49 Ensure 'Permissions for the Security Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.50 Ensure 'Permissions for the System Event Log must prevent access by non-privileged accounts' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

Block macros from running in Office files from the internet - accessMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the Internet - blockcontentexecutionfrominternet - accessMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the Internet - blockcontentexecutionfrominternet - excelMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the internet - blockcontentexecutionfrominternet - powerpointMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the Internet - blockcontentexecutionfrominternet - visioMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the Internet - blockcontentexecutionfrominternet - wordMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the internet - excelMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the internet - publisherMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Block macros from running in Office files from the internet - visioMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Default Protections for Recommended Software - AcrobatReaderMSCT Windows Server 2012 R2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - ExcelMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - jre6_javawMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - jre7_javawMSCT Windows Server 2012 R2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - jre7_javawMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - jre7_javawsMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - Picture ManagerMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - VisioViewerMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - WordMSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Default Protections for Recommended Software - WordpadMSCT Windows Server 2012 R2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

DTOO304 - Warning Bar settings for VBA macros must be configured.DISA STIG Microsoft PowerPoint 2016 v1r1Windows

CONFIGURATION MANAGEMENT

DTOO600 - Macros must be blocked from running in Office files from the Internet.DISA STIG Microsoft Word 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

JBOS-AS-000080 - The JBoss server must generate log records for access and authentication events to the management interface.DISA JBoss EAP 6.3 STIG v2r5Unix

AUDIT AND ACCOUNTABILITY

VBA Macro Notification Settings - vbawarnings - accessMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

VBA Macro Notification Settings - vbawarnings - ms projectMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

VBA Macro Notification Settings - vbawarnings - wordMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN10-CC-000063 - Windows 10 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN11-CC-000063 - Windows 11 systems must use either Group Policy or an approved Mobile Device Management (MDM) product to enforce STIG compliance.DISA Microsoft Windows 11 STIG v2r3Windows

CONFIGURATION MANAGEMENT