Item Search

NameAudit NamePluginCategory
1.6 Support Web Access Security - c) versionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 Set 'External send connector authentication: Ignore Start TLS' to 'False'CIS Microsoft Exchange Server 2016 Edge v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - a) Disable encryption noneTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - a) VersionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - b) ciphersuiteTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.12 Set 'External send connector authentication: Domain Security' to 'True'CIS Microsoft Exchange Server 2016 Edge v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.27 Ensure ldap_id_use_start_tls is set for LDAP.CIS Amazon Linux 2 STIG v1.0.0 L3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.1 Enable FileVault - Encryption TypeCIS Apple OSX 10.9 L1 v1.3.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.6.1 Enable FileVault - Encryption TypeCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

2.10 Set 'Configure startup mode' to 'TLS'CIS Microsoft Exchange Server 2013 UM v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.25.6 Ensure 'Protect Document Metadata for Password Protected Files' is set to EnabledCIS Microsoft Office 2016 v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.25.10 Ensure 'Disable Password to Open UI' is set to DisabledCIS Microsoft Office 2016 v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'MobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Ensure Federal Information Processing Standard (FIPS) is enabledCIS MongoDB L1 Windows Audit v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.2 Set Security TLS Version MaximumCIS Mozilla Firefox 38 ESR Windows L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.1 Set 'Turn off Encryption Support' to 'Use TLS 1.1 and TLS 1.2'CIS IE 11 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

6 - EncryptionTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7.1 Ensure HSTS Header is setCIS IIS 8.0 v1.5.1 Level 2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure SSLv3 is disabledCIS IIS 8.0 v1.5.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.9 Ensure RC2 Cipher Suites is disabled - RC2 56/128CIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabledCIS IIS 8.0 v1.5.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabled - RC4 56/128CIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.10 Ensure RC4 Cipher Suites is disabled - RC4 128/128CIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.12 Ensure AES 128/128 Cipher Suite is configuredCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.13 Ensure AES 256/256 Cipher Suite is enabled - EnabledCIS IIS 8.0 v1.5.1 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

7.13 Ensure AES 256/256 Cipher Suite is enabled - EnabledCIS IIS 7 L1 v1.8.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

29 - Ensure secure is set to true only for SSL-enabled ConnectorsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Allow users to proceed from the HTTPS warning pageMSCT Microsoft Edge Version 80 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow users to proceed from the HTTPS warning pageMSCT Microsoft Edge Version 81 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow users to proceed from the HTTPS warning pageMSCT Edge v84 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow users to proceed from the HTTPS warning pageMSCT Edge v85 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Enable HTTPS IPv4Tenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - Enable SSH IPv4Tenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - SNMP v3 uses AES instead of DESTenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Brocade - SNMPv3 uses SHA over MD5Tenable Best Practices Brocade FabricOSBrocade

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - SSL - Settings - SSL v3Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Enable IKE Version 1/2 - groupTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Encryption type for password protected Office Open XML filesMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Encryption type for password protected Office Open XML filesMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Fabric Security - Policy - FIPS ModeTenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

HTTP vs. HTTPS - sslArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

SYSTEM AND COMMUNICATIONS PROTECTION

Huawei: Enable SSHTNS Huawei VRP Best Practice AuditHuawei

SYSTEM AND COMMUNICATIONS PROTECTION

Management Access Policy - SSH - MACs - hmac-sha1Tenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabledMSCT Microsoft Edge Version 79 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabledMSCT Edge v85 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Minimum TLS version enabledMSCT Edge v87 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Routing Protocol Security - Select the strongest algorithm that is supported by your equipment and your neighbors - ISISJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION

Routing Protocol Security - Select the strongest algorithm that is supported by your equipment and your neighbors - RIPJuniper Hardening JunOS 12 Devices ChecklistJuniper

SYSTEM AND COMMUNICATIONS PROTECTION