Item Search

NameAudit NamePluginCategory
1.4.1 Ensure 'Enable EDR in block mode' is set to 'Enabled'CIS Microsoft Defender Antivirus v1.0.0 L1 ServerWindows

SYSTEM AND INFORMATION INTEGRITY

1.4.1 Ensure 'Enable EDR in block mode' is set to 'Enabled'CIS Microsoft Defender Antivirus v1.0.0 L1 WorkstationWindows

SYSTEM AND INFORMATION INTEGRITY

1.10.5 Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Defender Antivirus v1.0.0 L1 WorkstationWindows

SYSTEM AND INFORMATION INTEGRITY

1.10.5 Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Defender Antivirus v1.0.0 L1 ServerWindows

SYSTEM AND INFORMATION INTEGRITY

1.360 OL08-00-040300CIS Oracle Linux 8 STIG v1.0.0 CAT IIIUnix

CONFIGURATION MANAGEMENT

2.2.27 Ensure ldap_id_use_start_tls is set for LDAP - LDAP authentication communications.CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

2.2.28 Ensure ldap_tls_reqcert is set for LDAPCIS Amazon Linux 2 STIG v2.0.0 STIGUnix

ACCESS CONTROL

18.9.47.9.2 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.10.2 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.10.3 Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2025 v2.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2016 v4.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.10.3 (L1) Ensure 'Turn off real-time protection' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

22.4 (L1) Ensure 'Allow Realtime Monitoring' is set to 'Allowed'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

CISC-ND-001000 - The Cisco router must be configured to generate an alert for all audit failure events.DISA Cisco IOS XE Router NDM STIG v3r6Cisco

AUDIT AND ACCOUNTABILITY

DTBI760 - Browser must retain history on exit.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

ACCESS CONTROL

DTBI760-IE11 - Browser must retain history on exit.DISA STIG IE 11 v2r6Windows

AUDIT AND ACCOUNTABILITY

F5BI-AS-000163 - To protect against data mining, The BIG-IP ASM module must be configured to detect code injection attacks from being launched against data storage objects, including, at a minimum, databases, database records, queries, and fields when providing content filtering to virtual servers.DISA F5 BIG-IP Application Security Manager STIG v2r2F5

ACCESS CONTROL

F5BI-LT-000163 - To protect against data mining, the BIG-IP Core implementation providing content filtering must be configured to detect code injection attacks being launched against data storage objects.DISA F5 BIG-IP Local Traffic Manager STIG v2r4F5

ACCESS CONTROL

JUEX-L2-000020 - The Juniper EX switch must be configured to uniquely identify all network-connected endpoint devices before establishing any connection.DISA Juniper EX Series Layer 2 Switch v2r4Juniper

IDENTIFICATION AND AUTHENTICATION

JUSX-IP-000017 - The Juniper Networks SRX Series Gateway IDPS must protect against or limit the effects of known and unknown types of Denial of Service (DoS) attacks by employing rate-based attack prevention behavior analysis.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-020022 - The Oracle Linux operating system must not allow privileged accounts to utilize SSH.DISA Oracle Linux 7 STIG v3r5Unix

ACCESS CONTROL

PANW-IP-000024 - The Palo Alto Networks security platform must install updates for application software files, signature definitions, detection heuristics, and vendor-provided rules when new releases are available in accordance with organizational configuration management policy and procedures.DISA Palo Alto Networks IDPS STIG v3r2Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

RHEL-09-651030 - RHEL 9 must be configured so that the file integrity tool verifies Access Control Lists (ACLs).DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT

RHEL-09-651035 - RHEL 9 must be configured so that the file integrity tool verifies extended attributes.DISA Red Hat Enterprise Linux 9 STIG v2r8Unix

CONFIGURATION MANAGEMENT

RHEL-10-700410 - RHEL 10 must elevate the SELinux context when an administrator calls the sudo command.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL

Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Consumer Key'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : AuthConfig - 'Auth Providers = OpenIdConnect Default Scope'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce Consumer Secret'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce Execution User ID'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : AuthConfig - 'Auth Providers = Salesforce is not configured'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

CONFIGURATION MANAGEMENT

Salesforce.com : AuthConfig - 'Auth Providers in use'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : Email Services - 'IsTextAttachmentsAsBinary = False'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

CONFIGURATION MANAGEMENT

Salesforce.com : Monitoring Login History - 'Inactive System Administrators'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

Salesforce.com : Network-Based Security - 'Login IP Addresses'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

AUDIT AND ACCOUNTABILITY

Salesforce.com : Network-Based Security - 'Trusted IP Ranges exist'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

SYSTEM AND COMMUNICATIONS PROTECTION

Salesforce.com : Object Permissions - 'DefaultOpportunityAccess should not be Public Read/Write or Public Read/Write/Transfer'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

Salesforce.com : Setting Password Policies - 'lockout period >= 30 minutes'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

Salesforce.com : Setting Password Policies - 'Must mix numbers, uppercase and lowercase letters, and special characters'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

IDENTIFICATION AND AUTHENTICATION

Salesforce.com : Setting Session Security - 'Enable caching and autocomplete = false'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

CONFIGURATION MANAGEMENT

Salesforce.com : Setting Session Security - 'Enable clickjack protection for non-setup Salesforce pages = true'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

SYSTEM AND COMMUNICATIONS PROTECTION

Salesforce.com : Setting Session Security - 'Enable CSRF protection on GET requests on non-setup pages = true'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

SYSTEM AND COMMUNICATIONS PROTECTION

Salesforce.com : Setting Session Security - 'Lock session to IP = true'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

Salesforce.com : Setting Session Security - 'Review Apex Mobile User'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : Setting Session Security - 'Review Salesforce CRM Content User'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : Setting Session Security - 'Review user types'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : Setting Session Security - 'Review Work.com User'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com
Salesforce.com : User Access - Users have only been modified by known administratorsTNS Salesforce Best Practices Audit v1.2.0Salesforce.com

ACCESS CONTROL

SLEM-05-255055 - SLEM 5 SSH server must be configured to use only FIPS 140-2/140-3 validated key exchange algorithms.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

ACCESS CONTROL