Item Search

NameAudit NamePluginCategory
1.1.3.11.8 Configure 'Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers'CIS Windows 8 L1 v1.0.0Windows

CONFIGURATION MANAGEMENT

2.2.6 Ensure 'SQLNET.ENCRYPTION_CLIENT Is Set To 'REQUIRED'CIS Oracle Database 23ai v1.0.0 L1 RDBMS On Windows Server Host OSWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.5 Ensure the SharePoint setup account is configured with the minimum privileges on the SQL server.CIS Microsoft SharePoint 2016 DB v1.1.0MS_SQLDB
3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode'CIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode'CIS SQL Server 2017 Database L1 DB v1.3.0MS_SQLDB

ACCESS CONTROL

3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode'CIS SQL Server 2016 Database L1 DB v1.4.0MS_SQLDB

ACCESS CONTROL

3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode' - Windows Authentication modeCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

3.1 Ensure 'Server Authentication' Property is set to 'Windows Authentication Mode' - Windows Authentication modeCIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

3.5 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2022 Database L1 OS v1.1.0Windows

ACCESS CONTROL

3.5 Ensure the SQL Server's MSSQL Service Account is Not an AdministratorCIS SQL Server 2016 Database L1 OS v1.4.0Windows

ACCESS CONTROL

3.7 Ensure the SQL Server's Full-Text Service Account is Not an AdministratorCIS SQL Server 2022 Database L1 OS v1.1.0Windows

ACCESS CONTROL

6.3.3 Ensure 'user Connections' Database Flag for Cloud Sql Sql Server Instance Is Set to a Non-limiting ValueCIS Google Cloud Platform v3.0.0 L1GCP

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

CIS_MS_Windows_Server_2008_R2_DC_Level_1_v3.3.1.audit from CIS MS Windows Server 2008 R2 Benchmark v3.3.1CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows
CIS_MS_Windows_Server_2008_R2_MS_Level_2_v3.3.1.audit from CIS MS Windows Server 2008 R2 Benchmark v3.3.1CIS Microsoft Windows Server 2008 R2 Member Server Level 2 v3.3.1Windows
CIS_MS_Windows_Server_2008_v3.3.1_L1_DC.audit from CIS MS Windows Server 2008 non-R2 Benchmark v3.3.1CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows
CIS_MS_Windows_Server_2008_v3.3.1_L1_MS.audit from CIS MS Windows Server 2008 non-R2 Benchmark v3.3.1CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows
CIS_MS_Windows_Server_2008_v3.3.1_L2_DC.audit from CIS MS Windows Server 2008 non-R2 Benchmark v3.3.1CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows
CIS_MS_Windows_Server_2008_v3.3.1_L2_MS.audit from CIS MS Windows Server 2008 non-R2 Benchmark v3.3.1CIS Microsoft Windows Server 2008 Member Server Level 2 v3.3.1Windows
EX13-EG-000160 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX16-ED-000320 - Exchange Message size restrictions must be controlled on Receive connectors.DISA Microsoft Exchange 2016 Edge Transport Server STIG v2r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SP13-00-000165 - The SharePoint farm service account (database access account) must be configured with minimum privileges on the SQL server.DISA STIG SharePoint 2013 v2r4Windows

CONFIGURATION MANAGEMENT

SQL2-00-015800 - The OS must limit privileges to change SQL Server software resident within software libraries (including privileged programs) - 'Install'DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

SQL2-00-016500 - SQL Server must have the SQL Server Data Tools (SSDT) software component removed from SQL Server if SSDT is unused.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

CONFIGURATION MANAGEMENT

SQL2-00-018300 - SQL Server software libraries must be periodically backed up.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

CONTINGENCY PLANNING

SQL2-00-018600 - SQL Server must enforce password encryption for storage.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL2-00-022600 - SQL Server must employ cryptographic mechanisms preventing the unauthorized disclosure of information during transmission.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-023000 - The system must activate an alarm and/or automatically shut SQL Server down if a failure is detected in its software components.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

SQL2-00-038900 - If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL2-00-038910 - If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.DISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL4-00-016600 - SQL Server must have the SQL Server Reporting Services (SSRS) software component removed if it is unused.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL4-00-016805 - SQL Server must have the SQL Server Distributed Replay Client software component removed if it is unused.DISA STIG SQL Server 2014 Instance OS Audit v2r4Windows

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - DATABASE_ROLE_MEMBER_CHANGE_GROUPDISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - Event ID 152DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - Event ID 153DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - Event ID 175DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-034000 - SQL Server must produce Trace or Audit records of its enforcement of access restrictions associated with changes to the configuration of the DBMS or database(s) - SERVER_STATE_CHANGE_GROUPDISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-036600 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is created - Event ID 82DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036600 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is created - Event ID 84DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036600 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is created - Event ID 89DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-036600 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is created - Event ID 162DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037300 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted - Event ID 82DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037300 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted - Event ID 84DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037300 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted - Event ID 86DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037300 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted - Event ID 87DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-037300 - Trace or Audit records must be generated when categorized information (e.g., classification levels/security levels) is deleted - Event ID 89DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-038900 - If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password complexity.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL4-00-038910 - If SQL Server authentication, using passwords, is employed, SQL Server must enforce the DoD standards for password lifetime.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

IDENTIFICATION AND AUTHENTICATION

SQL6-D0-011900 - SQL Server must disable network functions, ports, protocols, and services deemed by the organization to be nonsecure, in accord with the Ports, Protocols, and Services Management (PPSM) guidance.DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

CONFIGURATION MANAGEMENT

SQL6-D0-012800 - Security-relevant software updates to SQL Server must be installed within the time period directed by an authoritative source (e.g. IAVM, CTOs, DTMs, and STIGs).DISA STIG SQL Server 2016 Instance DB Audit v3r4MS_SQLDB

SYSTEM AND INFORMATION INTEGRITY

SQL6-D0-016100 - SQL Server must configure SQL Server Usage and Error Reporting Auditing.DISA STIG SQL Server 2016 Instance OS Audit v3r4Windows

CONFIGURATION MANAGEMENT