Item Search

NameAudit NamePluginCategory
1.13.3.1.1 Ensure 'Allow users to demote attachments to Level 2' is set to DisabledCIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

CONFIGURATION MANAGEMENT

1.13.3.1.1 Ensure 'Allow users to demote attachments to Level 2' is set to DisabledCIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

CONFIGURATION MANAGEMENT

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NGWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Windows Server 2012 MS L1 v3.0.0Windows

IDENTIFICATION AND AUTHENTICATION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.9.2 (L1) Ensure 'Microsoft network server: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows Server 2019 v3.0.1 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

2.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iOS 18 v1.0.0 L1 End User OwnedMDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iPadOS 18 v1.0.0 L1 End User OwnedMDM

ACCESS CONTROL

3.1.2 Encrypt user data across the networkCIS IBM DB2 v10 v1.1.0 Linux OS Level 1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Encrypt user data across the networkCIS IBM DB2 v10 v1.1.0 Linux OS Level 2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Encrypt user data across the networkCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.1.2 Encrypt user data across the networkCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

ACCESS CONTROL

3.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

ACCESS CONTROL

4.1.7 Ensure Online Certificate Status Protocol (OCSP) stapling is enabledCIS NGINX Benchmark v2.1.0 L1 ProxyUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

5.1.4 Set 'Allow users to demote attachments to Level 2' to 'Disabled'CIS MS Office Outlook 2010 v1.0.0Windows

CONFIGURATION MANAGEMENT

5.3 Ensure 'ETW Logging' is enabled - Sites logFormat W3CCIS IIS 8.0 v1.5.1 Level 1Windows

AUDIT AND ACCOUNTABILITY

5.13 (L1) Ensure 'OpenSSH SSH Server (sshd)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

5.13 (L1) Ensure 'OpenSSH SSH Server (sshd)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 11 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

5.14 (L1) Ensure 'OpenSSH SSH Server (sshd)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

6.7.3 Ensure NTP Boot-Server is setCIS Juniper OS Benchmark v2.1.0 L2Juniper

AUDIT AND ACCOUNTABILITY

81.14 (L1) Ensure 'OpenSSH SSH Server (sshd)' is set to 'Disabled' or 'Not Installed'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

CISC-ND-001200 - The Cisco switch must be configured to use FIPS-validated Keyed-Hash Message Authentication Code (HMAC) to protect the integrity of remote maintenance sessions.DISA STIG Cisco IOS Switch NDM v3r2Cisco

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

DTOO114 - Excel - Open/Save actions for Excel 2 worksheets must be blocked.DISA STIG Office 2010 Excel v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000033 - The password hashes stored on the ESXi host must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.DISA STIG VMware vSphere 6.7 ESXi OS v1r3Unix

CONFIGURATION MANAGEMENT

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - '/etc/passwd'DISA STIG for Oracle Linux 5 v2r1Unix

IDENTIFICATION AND AUTHENTICATION

Login: SSH is enabledTNS Alcatel-Lucent TiMOS/Nokia SR-OS Best Practice AuditAlcatel

CONFIGURATION MANAGEMENT

OH12-1X-000008 - OHS must have the SSLFIPS directive enabled to encrypt remote connections in accordance with the categorization of data hosted by the web server.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000012 - OHS must have the SSLFIPS directive enabled to protect the integrity of remote sessions in accordance with the categorization of data hosted by the web server.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000022 - OHS must have the OraLogSeverity directive defined to generate adequate information to be used by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000202 - OHS must have the SSLSessionCacheTimeout directive set properly.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000224 - The OHS server root directory must not be on a network share.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

OH12-1X-000241 - OHS must use FIPS modules to encrypt passwords during transmission.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000245 - OHS must use FIPS modules to perform RFC 5280-compliant certification path validation.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

IDENTIFICATION AND AUTHENTICATION

OH12-1X-000295 - OHS must have the SSLFIPS directive enabled to implement required cryptographic protections using cryptographic modules complying with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting data that must be compartmentalized.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000309 - OHS must have the SSLFIPS directive enabled to prevent unauthorized disclosure of information during transmission.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000325 - OHS must have the SSLFIPS directive enabled to maintain the confidentiality and integrity of information during preparation for transmission.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000332 - OHS must have the SSLFIPS directive enabled to maintain the confidentiality and integrity of information during reception.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-025300 - The OS must limit privileges to the SQL Server backup directories and files.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

SYMP-NM-000110 - Symantec ProxySG must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

SYMP-NM-000140 - Symantec ProxySG must back up event logs onto a different system or system component than the system or component being audited - Syslog IPDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

AUDIT AND ACCOUNTABILITY