Item Search

NameAudit NamePluginCategory
1.1.1.1.7 Ensure enhanced weak passcode detection is set to enabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.19 Ensure 'Improve harmful app detection' is set to 'Enabled'MobileIron - CIS Google Android v1.3.0 L1MDM
1.21 Ensure 'Improve harmful app detection' is set to EnabledMobileIron - CIS Google Android 7 v1.0.0 L1MDM
1.21 Ensure 'Improve harmful app detection' is set to EnabledAirWatch - CIS Google Android 7 v1.0.0 L1MDM
3.1.1.1.4 Ensure use enhanced weak password detection is set to enabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

3.2.1.24 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'MobileIron - CIS Apple iOS 14 and iPadOS 14 Institution Owned L1MDM

ACCESS CONTROL

4.2.5 Enable grayware detection on antivirusCIS Fortigate 7.0.x v1.3.0 L2FortiGate

SYSTEM AND INFORMATION INTEGRITY

4.6.2 Ensure BFD Authentication is Not Set to Loose-CheckCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categoriesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categoriesCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.20 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories - continue on the URL categoriesCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.20 Ensure that User Credential Submission uses the action of block or continue on the URL categoriesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - basic-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - From-addressDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - logging severityDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - Recipient-addressDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - scanning-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - smtpDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA Cisco NX OS Switch L2S STIG v3r2Cisco

CONFIGURATION MANAGEMENT

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Cisco IOS XE Switch L2S v3r1Cisco

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v21H1 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 1909 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2025 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

DTBI715 - Crash Detection must be enforced.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

CONFIGURATION MANAGEMENT

DTBI715-IE11 - Crash Detection management must be enforced.DISA STIG IE 11 v2r5Windows

CONFIGURATION MANAGEMENT

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - AV GraywareTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND INFORMATION INTEGRITY

JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.DISA Juniper SRX Services Gateway VPN v3r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Detection Prevention - ICMP packetsTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Detection Prevention - IP TTL DecrementTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000540 - Symantec ProxySG must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000320 - Symantec ProxySG must enable Attack Detection.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-GE-000022 - Servers must have a host-based Intrusion Detection System.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WNDF-AV-000001 - Microsoft Defender AV must be configured to block the Potentially Unwanted Application (PUA) feature - PUA feature.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY