Item Search

NameAudit NamePluginCategory
1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows Server 2019 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 NGWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled' (MS only)CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2022 v4.0.0 L1 MSWindows

ACCESS CONTROL

1.2.3 (L1) Ensure 'Allow Administrator account lockout' is set to 'Enabled' (MS only)CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

1.2.4 Ensure 'Allow Administrator account lockout' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

1.2.4 Ensure 'Allow Administrator account lockout' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

1.3.2 Ensure 'Maximum lifetime for service ticket' is set to '600 or fewer minutes, but not 0' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION

1.3.2 Ensure 'Maximum lifetime for service ticket' is set to '600 or fewer minutes, but not 0' (STIG DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

IDENTIFICATION AND AUTHENTICATION

18.9.18.2 Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.18.2 Ensure 'Turn Off user-installed desktop gadgets' is set to 'Enabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.10.9.1.3 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.9.1.11 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NGWindows

IDENTIFICATION AND AUTHENTICATION

18.10.9.1.11 (L1) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION

18.10.9.3.3 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NGWindows

MEDIA PROTECTION

18.10.9.3.3 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 10 Stand-alone v3.0.0 BLWindows

MEDIA PROTECTION

18.10.9.3.11 (L1) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION

18.10.10.1.3 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.10.1.8 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 BLWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.1.8 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.1.11 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.1.11 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v4.0.0 BitLockerWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.1.11 (BL) Ensure 'Configure use of passwords for fixed data drives' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.3.3 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

MEDIA PROTECTION

18.10.10.3.3 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

MEDIA PROTECTION

18.10.10.3.11 (BL) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 BLWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.3.11 (BL) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

IDENTIFICATION AND AUTHENTICATION

18.10.10.3.11 (BL) Ensure 'Configure use of passwords for removable data drives' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

IDENTIFICATION AND AUTHENTICATION

18.10.15.2 Ensure 'Allow Diagnostic Data' is set to 'Enabled: Send required diagnostic data' or 'Enabled: Send optional diagnostic data' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

18.10.15.2 Ensure 'Allow Diagnostic Data' is set to 'Enabled: Send required diagnostic data' or 'Enabled: Send optional diagnostic data' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

18.10.37.1 (L2) Ensure 'Turn off location' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

20.52 Ensure 'Permissions for the Windows installation directory conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

ACCESS CONTROL

20.52 Ensure 'Permissions for the Windows installation directory conform to minimum requirements'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows Server v2004 MS v1.0.0Windows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows Server 2019 MS v1.0.0Windows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows 11 v23H2 v1.0.0Windows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows Server 2025 MS v1.0.0Windows

ACCESS CONTROL

Configure RPC packet level privacy setting for incoming connectionsMSCT Windows 11 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure RPC packet level privacy setting for incoming connectionsMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

SQL2-00-004700 - SQL Server must not grant users direct access to the Alter any login permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

SQL2-00-005000 - SQL Server must not grant users direct access to the Create trace event notification permission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL

WN12-CC-000064-MS - Unauthenticated RPC clients must be restricted from connecting to the RPC server.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

IDENTIFICATION AND AUTHENTICATION