Item Search

NameAudit NamePluginCategory
1.001 - Physical security of the Automated Information System (AIS) does not meet DISA requirements.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

1.1.1.1 TACACS+CIS Cisco IOS XR 7.x v1.0.1 L2Cisco

ACCESS CONTROL

1.1.3 Enable 'aaa authentication enable default'CIS Cisco IOS XE 17.x v2.2.0 L1Cisco

ACCESS CONTROL

1.1.7 - AirWatch - Disable 'Wi-Fi'AirWatch - CIS Google Android 4 v1.0.0 L2MDM

ACCESS CONTROL

1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

1.2.3 Ensure 'Account lockout threshold' is set to '3 or fewer invalid logon attempt(s), but not 0' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

ACCESS CONTROL

1.3.1 Ensure 'Enforce user logon restrictions' is set to 'Enabled' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

1.4.2 Enable 'service password-encryption'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.4.2 Enable 'service password-encryption'CIS Cisco IOS XE 17.x v2.2.0 L1Cisco

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.4 Configure Logging TimestampsCIS Cisco NX-OS v1.2.0 L1Cisco

AUDIT AND ACCOUNTABILITY

1.013 - System information backups are not created, updated, and protected according to DISA requirements.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key'CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.14.1 Ensure 'System cryptography: Force strong key protection for user keys stored on the computer' is set to 'User must enter a password each time they use a key' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.1.3.1 Set Interfaces with no Peers to Passive-InterfaceCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1.3.3 Log OSPF Adjacency ChangesCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.2.2 Disable ICMP Redirects on all Layer 3 InterfacesCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION

4.3 Configure Alerts on all Configuration ChangesCIS Cisco NX-OS v1.2.0 L2Cisco

CONFIGURATION MANAGEMENT

20.20 Ensure 'DoD Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systemsCIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.20 Ensure 'DoD Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systems (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.20 Ensure 'DoD Interoperability Root CA cross-certificates' are installed in the 'Untrusted Certificates Store' on unclassified systems (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

20.27 Ensure 'Event Viewer must be protected from unauthorized modification and deletion'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.59 Ensure 'Software certificate installation files must be removed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.59 Ensure 'Software certificate installation files must be removed' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.67 Ensure 'The system uses an anti-virus program' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.67 Ensure 'The system uses an anti-virus program' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

CISC-ND-000610 - The Cisco router must be configured to require that when a password is changed, the characters are changed in at least eight of the positions within the password.DISA Cisco IOS Router NDM STIG v3r4Cisco

IDENTIFICATION AND AUTHENTICATION

CISC-ND-001150 - The Cisco router must be configured to authenticate Network Time Protocol (NTP) sources using authentication that is cryptographically based.DISA Cisco IOS XE Router NDM STIG v3r4Cisco

IDENTIFICATION AND AUTHENTICATION

DG0071-ORACLE11 - New passwords must be required to differ from old passwords by more than four characters - 'PASSWORD_VERIFY_FUNCTION is not set to NULL or DEFAULT'DISA STIG Oracle 11 Instance v9r1 DatabaseOracleDB
First Hop Security - Source Guard - Admin StatusTenable Cisco ACICisco_ACI

CONFIGURATION MANAGEMENT

OH12-1X-000233 - OHS hosted web sites must utilize ports, protocols, and services according to PPSM guidelines.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

Port security auto-recoveryArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

Prevent enabling lock screen cameraMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2019 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 1803 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 10 v1507 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2016 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT MSCT Windows Server 2022 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen cameraMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Prevent enabling lock screen camera - NoLockScreenCameraMSCT Windows Server 2025 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

VCSA-70-000270 - The vCenter Server must set the distributed port group Promiscuous Mode policy to 'Reject'.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000270 - The vCenter Server must set the distributed port group Promiscuous Mode policy to "Reject".DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCTR-67-000015 - The vCenter Server must set the distributed port group Promiscuous Mode policy to reject.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

vNetwork : reject-mac-changes-dvportgroupVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION

vNetwork : reject-mac-changes-dvportgroupVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND COMMUNICATIONS PROTECTION