Item Search

NameAudit NamePluginCategory
1.4 SNMP Security - c) SNMP Security Protection FunctionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.7 Log AuditingTenable ZTE ROSNGZTE_ROSNG

AUDIT AND ACCOUNTABILITY

1.8 SSH Strong Algorithm - c) Disable encryption aes128-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - f) Disable encryption blowfish-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - i) Disable diffie-hellman group-exchange-sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - j) Disable diffie-hellman group1-sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - k) Disable hmac sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - d) renegotiateTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.2.26 Ensure ldap_tls_cacert is set for LDAP.CIS Amazon Linux 2 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.3 Disable the Proxy ARP Function - a) No proxyTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.3 Disable the Proxy ARP Function - c) No proxy localTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

3.2 Authentication and Verification of ISIS Routing Protocols - authentication-type hmac-md5Tenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2022 v4.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2025 v1.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

APPL-13-002069 - The macOS system must prevent nonprivileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.DISA STIG Apple macOS 13 v1r5Unix

ACCESS CONTROL

CASA-ND-000930 - The Cisco ASA must be configured to generate an immediate real-time alert of all audit failure events requiring real-time alerts.DISA STIG Cisco ASA NDM v2r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001000 - The Cisco router must be configured to generate an alert for all audit failure events.DISA Cisco IOS XE Router NDM STIG v3r4Cisco

AUDIT AND ACCOUNTABILITY

HTTP TRACE method should be disabled. 'RewriteLogLevel'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Huawei: Disable SNMP write accessTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Enable AAA authorizationTNS Huawei VRP Best Practice AuditHuawei

IDENTIFICATION AND AUTHENTICATION

Huawei: Set 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set 'shell' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set appropriate 'login' headerTNS Huawei VRP Best Practice AuditHuawei

ACCESS CONTROL

Huawei: Set System NameTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'ErrorLog logs/error_log'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

MaxSpareServers parameter value should be appropriately configured.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-020022 - The Oracle Linux operating system must not allow privileged accounts to utilize SSH.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

OL07-00-020023 - The Oracle Linux operating system must elevate the SELinux context when an administrator calls the sudo command.DISA Oracle Linux 7 STIG v3r2Unix

ACCESS CONTROL

OpenStack Compute - user/group ownership of config files set to root/nova - /etc/nova/policy.jsonTNS OpenStack Nova/Compute Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Horizon - disable_password_reveal parameter set to TrueTNS OpenStack Dashboard/Horizon Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Horizon - password_autocomplete parameter set to offTNS OpenStack Dashboard/Horizon Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Horizon - SESSION_COOKIE_SECURE parameter set to TrueTNS OpenStack Dashboard/Horizon Security GuideUnix

SYSTEM AND COMMUNICATIONS PROTECTION

OpenStack Horizon - strict permissions set for horizon configuration files - /etc/openstack-dashboard/local_settings.pyTNS OpenStack Dashboard/Horizon Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Identity - strict permissions set for Identity configuration files - /etc/keystone/keystone.confTNS OpenStack Keystone/Identity Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Identity - user/group ownership of config files set to keystone - /etc/keystone/keystone.confTNS OpenStack Keystone/Identity Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Identity - user/group ownership of config files set to keystone - /etc/keystone/ssl/private/signing_key.pemTNS OpenStack Keystone/Identity Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Networking - strict permissions set for Compute configuration files - /etc/neutron/neutron.confTNS OpenStack Neutron/Networking Security GuideUnix

CONFIGURATION MANAGEMENT

OpenStack Networking - user/group ownership of config files set to root/neutron - /etc/neutron/api-paste.iniTNS OpenStack Neutron/Networking Security GuideUnix

CONFIGURATION MANAGEMENT

PANW-AG-000064 - The Palo Alto Networks security platform must send an immediate (within seconds) alert to the system administrator, at a minimum, in response to malicious code detection - within seconds alert to the system administrator, at a minimum, in response to malicious code detectionDISA STIG Palo Alto ALG v3r4Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-431016 - RHEL 9 must elevate the SELinux context when an administrator calls the sudo command.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL

RHEL-09-651030 - RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

CONFIGURATION MANAGEMENT

Turn off real-time protectionMSCT Windows 11 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

User IDs which disclose the privileges associated with it, should not be created. 'lock'TNS IBM HTTP Server Best PracticeUnix

ACCESS CONTROL