Item Search

NameAudit NamePluginCategory
1 - Remove or Disable Example Content - ExampleDSTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

2.2.45 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.2.45 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

2.2.46 Ensure 'Increase scheduling priority' is set to 'Administrators' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG DC & MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

2.3.7.10 Ensure 'Interactive logon: Smart card removal behavior' is set to 'Lock Workstation' or 'Force Logoff' (STIG only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

17.7.2 Ensure 'Audit Audit Policy Change' is set to include 'Success and Failure' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

AUDIT AND ACCOUNTABILITY

17.7.3 Ensure 'Audit Audit Policy Change' is set to include 'Success and Failure' (STIG only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - *opera.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Foxit Reader.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - googletalk.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - iTunes.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - mirc.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - opera.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - QuickTimePlayer.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - realconverter.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - realplay.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Skype.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - Thunderbird plugin-container.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - vlc.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winamp.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - WindowsLiveWriter.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winrar.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winzip32.exeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - winzip64.exeeCIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

20.52 Ensure 'Permissions for the Windows installation directory conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.52 Ensure 'Permissions for the Windows installation directory conform to minimum requirements'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

20.60 Ensure 'System files must be monitored for unauthorized changes' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.60 Ensure 'System files must be monitored for unauthorized changes' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

CIS_Microsoft_Windows_Server_2019_STIG_v3.0.0_Next_Generation_Windows_Security_-_Domain_Controller.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v3.0.0CIS Microsoft Windows Server 2019 STIG v3.0.0 NG DCWindows
CIS_Microsoft_Windows_Server_2019_STIG_v3.0.0_Next_Generation_Windows_Security_-_Member_Server.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v3.0.0CIS Microsoft Windows Server 2019 STIG v3.0.0 NG MSWindows
CIS_Microsoft_Windows_Server_2022_STIG_v2.0.0_Next_Generation_Windows_Security_-_Domain_Controller.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v2.0.0CIS Microsoft Windows Server 2022 STIG v2.0.0 NG DCWindows
CIS_Microsoft_Windows_Server_2022_STIG_v2.0.0_Next_Generation_Windows_Security_-_Member_Server.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v2.0.0CIS Microsoft Windows Server 2022 STIG v2.0.0 NG MSWindows
SPLK-CL-000035 - Splunk Enterprise must display the Standard Mandatory DOD Notice and Consent Banner and accept user acknowledgement before granting access to the application.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

ACCESS CONTROL

SPLK-CL-000060 - Splunk Enterprise must use HTTPS/SSL for access to the user interface.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000080 - Splunk Enterprise must use LDAPS for the LDAP connection.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000180 - Splunk Enterprise idle session timeout must be set to not exceed 15 minutes.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

SYSTEM AND COMMUNICATIONS PROTECTION

SPLK-CL-000280 - Splunk Enterprise must be configured with a successful/unsuccessful logon attempts report.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

SPLK-CL-000300 - Splunk Enterprise must notify the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) of all audit failure events, such as loss of communications with hosts and devices, or if log records are no longer being received.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

SPLK-CL-000320 - Splunk Enterprise must be configured to notify the System Administrator (SA) and Information System Security Officer (ISSO), at a minimum, when an attack is detected on multiple devices and hosts within its scope of coverage.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

CONFIGURATION MANAGEMENT

SPLK-CL-000340 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one lowercase character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000370 - Splunk Enterprise must enforce password complexity for the account of last resort by requiring that at least one special character be used.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

SPLK-CL-000380 - Splunk Enterprise must enforce a 60-day maximum password lifetime restriction for the account of last resort.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

VCEM-67-000013 - ESX Agent Manager must have mappings set for Java servlet pages.DISA STIG VMware vSphere 6.7 EAM Tomcat v1r4Unix

CONFIGURATION MANAGEMENT

VCPF-67-000006 - Performance Charts must generate log records for system startup and shutdown.DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

VCUI-70-000006 - vSphere UI must generate log records for system startup and shutdown.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

AUDIT AND ACCOUNTABILITY

WN11-CC-000038 - WDigest Authentication must be disabled.DISA Microsoft Windows 11 STIG v2r3Windows

CONFIGURATION MANAGEMENT

WN12-SO-000039 - The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-SO-000039 - The system must be configured to prevent Internet Control Message Protocol (ICMP) redirects from overriding Open Shortest Path First (OSPF) generated routes.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT