Item Search

NameAudit NamePluginCategory
1.1.8 - MobileIron - Turn off Ask to Join NetworksMobileIron - CIS Apple iOS 9 v1.0.0 L2MDM

ACCESS CONTROL

1.8.3 Ensure disable-user-list is enabledCIS Ubuntu Linux 16.04 LTS Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

1.11 Ensure 'Unknown sources' is set to DisabledMobileIron - CIS Google Android 7 v1.0.0 L1MDM

CONFIGURATION MANAGEMENT

3.4 Control access to audit records - /etc/security/audit_controlCIS Apple macOS 10.12 L1 v1.2.0Unix
3.4 Control access to audit records - /var/auditCIS Apple macOS 10.12 L1 v1.2.0Unix

AUDIT AND ACCOUNTABILITY

4.8 Ensure Billing Alerts are enabled for increments of X spendCIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws
5.4 Ensure 'Default Restrict' is set in all client listsCIS Juniper OS Benchmark v2.1.0 L1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

12.30 Public dissemination of database information - 'Disallow'CIS v1.1.0 Oracle 11g OS L1Unix
12.30 Public dissemination of database information - 'Disallow'CIS v1.1.0 Oracle 11g OS Windows Level 1Windows
Allow user control over installsMSCT Windows 10 v2004 v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows 10 v1507 v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server 1903 MS v1.19.9Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server v1909 DC v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server v1909 MS v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Allow user control over installsMSCT Windows 11 v22H2 v1.0.0Windows

ACCESS CONTROL

DTAVSEL-102 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to find unknown program viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-103 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to find unknown macro viruses.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

HP ProCurve - 'Disable HTTP'TNS HP ProCurveHPProCurve

CONFIGURATION MANAGEMENT

HP ProCurve - 'Enable DHCP snooping'TNS HP ProCurveHPProCurve

SYSTEM AND COMMUNICATIONS PROTECTION

HP ProCurve - 'Enable SNMPv3'TNS HP ProCurveHPProCurve

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

HP ProCurve - 'Enable SSH'TNS HP ProCurveHPProCurve

CONFIGURATION MANAGEMENT

JUEX-RT-000740 - The Juniper perimeter router must be configured to block inbound packets with source Bogon IP address prefixes.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

List physical storage locationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM memory allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000009 - The Red Hat Network Service (rhnsd) service must not be running, unless it is being used to query the Oracle Unbreakable Linux Network for updates and information - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

Prevent per-user installation of ActiveX controlsMSCT Windows Server v20H2 DC v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Prevent per-user installation of ActiveX controlsMSCT Windows 11 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Review the list of Current OpenStack UsersTenable Best Practices OpenStack v2.0.0OpenStack

ACCESS CONTROL

Review the list of Current Rackspace UsersTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Review the list of Rackspace Database FlavorsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

RHEL-07-010180 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed the number of repeating consecutive characters must not be more than three characters.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-010430 - The Red Hat Enterprise Linux operating system must be configured so that the delay between logon prompts following a failed console logon attempt is at least four seconds.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

RHEL-07-020300 - The Red Hat Enterprise Linux operating system must be configured so that all Group Identifiers (GIDs) referenced in the /etc/passwd file are defined in the /etc/group file.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-021010 - The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are used with removable media.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SonicWALL - Login Banner - WAN ZoneTNS SonicWALL v5.9SonicWALL

ACCESS CONTROL

SonicWALL - Security Services - Gateway AV - ActivatedTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - Security Services - Gateway AV - FTP OutboundTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - Security Services - IDP - Signature DB PresentTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect SSLv2TNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control - Detect Weak Ciphers (<64 bits)TNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control ON - DMZTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

SonicWALL - SSL Control ON - WLANTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY