Item Search

NameAudit NamePluginCategory
1.4.3 Set 'username secret' for all local usersCIS Cisco IOS XE 17.x v2.2.0 L1Cisco

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

AUDIT AND ACCOUNTABILITY

1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco Firewall v8.x L1 v4.2.0Cisco

CONFIGURATION MANAGEMENT

1.27 Ensure 'Guest profiles' do not existMobileIron - CIS Google Android 7 v1.0.0 L1MDM
2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key'CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3.1 Ensure OSPF authentication is set to MD5CIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - /etc/shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

5.5.1.2 Ensure minimum days between password changes is configured - login.defsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.5.1.2 Ensure minimum days between password changes is configured - password shadowCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

18.10.16.1 Ensure 'Download Mode' is set to 'Enabled' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

20.20 Ensure 'DoD Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systemsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.57 Ensure 'Server Message Block (SMB) v1 protocol must not be installed'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

ARST-ND-000860 - The Arista network device must be running an operating system release that is currently supported by the vendor.DISA STIG Arista MLS EOS 4.2x NDM v2r1Arista

CONFIGURATION MANAGEMENT

CASA-ND-001370 - The Cisco ASA must be configured to obtain its public key certificates from an appropriate certificate policy through an approved service provider.DISA STIG Cisco ASA NDM v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies.DISA STIG Cisco ASA VPN v2r2Cisco

ACCESS CONTROL

CASA-VN-000360 - The Cisco ASA VPN gateway must be configured to renegotiate the IKE security association after 24 hours or less.DISA STIG Cisco ASA VPN v2r2Cisco

IDENTIFICATION AND AUTHENTICATION

CASA-VN-000400 - The Cisco ASA remote access VPN server must be configured to use LDAP over SSL to determine authorization for granting access to the network.DISA STIG Cisco ASA VPN v2r2Cisco

ACCESS CONTROL

CASA-VN-000560 - The Cisco ASA remote access VPN server must be configured to use a FIPS-validated algorithm and hash function to protect the integrity of TLS remote access sessions.DISA STIG Cisco ASA VPN v2r2Cisco

ACCESS CONTROL

CASA-VN-000720 - The Cisco ASA VPN remote access server must be configured to generate log records when successful and/or unsuccessful VPN connection attempts occur.DISA STIG Cisco ASA VPN v2r2Cisco

AUDIT AND ACCOUNTABILITY

CISC-ND-001150 - The Cisco router must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.DISA Cisco IOS Router NDM STIG v3r4Cisco

IDENTIFICATION AND AUTHENTICATION

Ensure timezone is properly configuredTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

ESXI5-VMNET-000004 - Virtual switch VLANs must be fully documented and have only the required VLANs.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

First Hop Security - IP Inspection - Admin StatusTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server v20H2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server v2004 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2016 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 11 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2022 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v20H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 1903 DC v1.19.9Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 1903 MS v1.19.9Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server v1909 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2012 R2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Syslog Remote Destination - HostTenable Cisco ACICisco_ACI

AUDIT AND ACCOUNTABILITY

VCWN-06-000015 - The system must ensure the distributed port group Promiscuous Mode policy is set to reject.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000015 - The vCenter Server for Windows must set the distributed port group Promiscuous Mode policy to reject.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

vNetwork : reject-forged-transmit-dvportgroupVMWare vSphere 6.5 Hardening GuideVMware
vNetwork : reject-promiscuous-mode-dvportgroupVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

WG610 W22 - Web sites must utilize ports, protocols, and services according to PPSM guidelines.DISA STIG Apache Site 2.2 Windows v1r13Windows