Item Search

NameAudit NamePluginCategory
1.11 Audit Docker files and directories - docker.socketCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.12 Audit Docker files and directories - /etc/default/dockerCIS Docker 1.11.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.12 Audit Docker files and directories - /etc/default/dockerCIS Docker 1.12.0 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.14 Audit Docker files and directories - /etc/sysconfig/dockerCIS Docker 1.6 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.18 Audit Docker files and directories - /etc/default/dockerCIS Docker 1.6 v1.0.0 L1 LinuxUnix

AUDIT AND ACCOUNTABILITY

1.98 WN16-CC-000050CIS Microsoft Windows Server 2016 STIG v4.0.0 DC CAT IIIWindows

CONFIGURATION MANAGEMENT

1.98 WN16-CC-000050CIS Microsoft Windows Server 2016 STIG v4.0.0 MS CAT IIIWindows

CONFIGURATION MANAGEMENT

1.98 WN19-CC-000040CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIIWindows

CONFIGURATION MANAGEMENT

1.98 WN19-CC-000040CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIIWindows

CONFIGURATION MANAGEMENT

1.98 WN22-CC-000040CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT IIIWindows

CONFIGURATION MANAGEMENT

1.98 WN22-CC-000040CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT IIIWindows

CONFIGURATION MANAGEMENT

2.3.2 Ensure Screen Saver Corners Are Secure - bottom right cornerCIS Apple macOS 10.14 v2.0.0 L2Unix

ACCESS CONTROL

2.3.2 Ensure Screen Saver Corners Are Secure - top left cornerCIS Apple macOS 10.14 v2.0.0 L2Unix

ACCESS CONTROL

5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.2.10 Ensure number of characters changed in new password is configuredCIS IBM AIX 7 v1.1.0 L1Unix

IDENTIFICATION AND AUTHENTICATION

5.003 - Booting into alternate operating systems is permitted.DISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

7.2 Set Strong Password Creation Policies - MINNONALPHA = 1CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - DICTIONLIST = /usr/share/lib/dict/wordsCIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - HISTORY = 10CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MAXREPEATS = 0CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - MINUPPER = 1CIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - NAMECHECK = yesCIS Solaris 11.2 L1 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

7.2 Set Strong Password Creation Policies - PASSLENGTH = 8CIS Solaris 11.1 L1 v1.0.0Unix

IDENTIFICATION AND AUTHENTICATION

89.7 (L1) Ensure 'Create Global Objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

89.7 (L1) Ensure 'Create Global Objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

AIOS-13-013100 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch.AirWatch - DISA Apple iOS/iPadOS 13 v2r1MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AIOS-14-011000 - Apple iOS/iPadOS must implement the management setting: disable paired Apple Watch.AirWatch - DISA Apple iOS/iPadOS 14 v1r3MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CIS_Microsoft_Windows_Server_2016_STIG_v4.0.0_DC_CAT_I.audit from CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0CIS Microsoft Windows Server 2016 STIG v4.0.0 DC CAT IWindows
CIS_Microsoft_Windows_Server_2016_STIG_v4.0.0_MS_CAT_I.audit from CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0CIS Microsoft Windows Server 2016 STIG v4.0.0 MS CAT IWindows
CIS_Microsoft_Windows_Server_2016_STIG_v4.0.0_MS_CAT_II.audit from CIS Microsoft Windows Server 2016 STIG Benchmark v4.0.0CIS Microsoft Windows Server 2016 STIG v4.0.0 MS CAT IIWindows
CIS_Microsoft_Windows_Server_2019_STIG_v4.0.0_DC_CAT_I.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v4.0.0CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IWindows
CIS_Microsoft_Windows_Server_2019_STIG_v4.0.0_DC_CAT_II.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v4.0.0CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT IIWindows
CIS_Microsoft_Windows_Server_2019_STIG_v4.0.0_MS_CAT_II.audit from CIS Microsoft Windows Server 2019 STIG Benchmark v4.0.0CIS Microsoft Windows Server 2019 STIG v4.0.0 MS CAT IIWindows
CIS_Microsoft_Windows_Server_2022_STIG_v3.0.0_DC_CAT_I.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v3.0.0CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT IWindows
CIS_Microsoft_Windows_Server_2022_STIG_v3.0.0_MS_CAT_I.audit from CIS Microsoft Windows Server 2022 STIG Benchmark v3.0.0CIS Microsoft Windows Server 2022 STIG v3.0.0 MS CAT IWindows
CISC-ND-001450 - The Cisco switch must be configured to send log data to at least two central log servers for the purpose of forwarding alerts to the administrators and the information system security officer (ISSO).DISA Cisco NX OS Switch NDM STIG v3r6Cisco

AUDIT AND ACCOUNTABILITY

Do not allow drive redirectionMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Do not allow drive redirectionMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Do not allow drive redirectionMSCT Windows Server 2016 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Do not allow drive redirectionMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

ESXI-65-000034 - The ESXi host must disable the Managed Object Browser (MOB).DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

OS10-L2S-000190 - The Dell OS10 Switch must enable Far-End Failure Detection (FEFD) to protect against one-way connections.DISA Dell OS10 Switch Layer 2 Switch STIG v1r1Dell_OS10

CONFIGURATION MANAGEMENT

WN16-CC-000040 - Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN16-CC-000050 - Source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-CC-000030 - Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2019 STIG v3r8Windows

CONFIGURATION MANAGEMENT

WN19-CC-000040 - Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.DISA Microsoft Windows Server 2019 STIG v3r8Windows

CONFIGURATION MANAGEMENT

WN22-CC-000030 - Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2022 STIG v2r8Windows

CONFIGURATION MANAGEMENT

WN22-CC-000040 - Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.DISA Microsoft Windows Server 2022 STIG v2r8Windows

CONFIGURATION MANAGEMENT

WN25-CC-000030 - Windows Server 2025 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2025 STIG v1r1Windows

CONFIGURATION MANAGEMENT

WN25-CC-000040 - Windows Server 2025 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.DISA Microsoft Windows Server 2025 STIG v1r1Windows

CONFIGURATION MANAGEMENT