Item Search

NameAudit NamePluginCategory
5.6 Ensure Password Complexity is configuredCIS PostgreSQL 17 v1.0.0 L1 PostgreSQLPostgreSQLDB

IDENTIFICATION AND AUTHENTICATION

6.31 Don't use the default VPCCIS Amazon Web Services Three-tier Web Architecture L2 1.0.0amazon_aws
Android Compliance Policy - Block apps from unknown sourcesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Compliance Policy - Maximum minutes of inactivity before password is requiredTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Google backupTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Add and remove accountsTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Contact sharing via BluetoothTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Work Profile Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Work profile notifications while device lockedTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Ensure 'console session timeout' is set to organizational policyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure 'Failover' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Integrity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'logging buffer size' is greater than or equal to '524288' bytes (512kb)Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'logging trap severity ' is greater than or equal to '5'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'noproxyarp' is enabled for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'OSPF authentication' is enabledTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

IDENTIFICATION AND AUTHENTICATION

Ensure 'Password Policy' is enabled - minimum-lengthTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

IDENTIFICATION AND AUTHENTICATION

Ensure 'SNMP traps' is enabled - authenticationTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

AUDIT AND ACCOUNTABILITY

Ensure 'SSH source restriction' is set to an authorized IP addressTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure DHCP services are disabled for untrusted interfaces - dhcprelayTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - domain-lookupTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - name-serverTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure ICMP is restricted for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure intrusion prevention is enabled for untrusted interfacesTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure known default accounts do not exist - cmd_execTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

ACCESS CONTROL

Ensure non-default application inspection is configured correctlyTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure timezone is properly configuredTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

CONFIGURATION MANAGEMENT

iOS Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - AirDropTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - CameraTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Changes to app cellular data usage settingsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Game CenterTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Maximum minutes after screen lock before password is requiredTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Passcode modificationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - PasswordTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Prevent reuse of previous passwordsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Required password typeTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Share usage dataTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Today view while device lockedTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Wallet notifications while device lockedTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Compliance Policy - Maximum minutes of inactivity before password is requiredTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Compliance Policy - Required password typeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

macOS Compliance Policy - Simple passwords.Tenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Maximum minutes after screen lock before password is requiredTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Prevent reuse of previous passwordsTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

macOS Device Management - Required password typeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

SQL2-00-001600 - SQL Server must ensure that remote sessions that access an organization-defined list of security functions and security-relevant information are audited - 'Event ID 109'DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

ACCESS CONTROL