Item Search

NameAudit NamePluginCategory
1.4.4 Ensure core dump storage is disabledCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

ACCESS CONTROL

2.3.10.4 Ensure 'Network access: Do not allow anonymous enumeration of SAM accounts and shares' is set to 'Enabled' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.7 Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.13 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3.13.1 (L1) Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3.13.1 Ensure 'Shutdown: Allow system to be shut down without having to log on' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.17.3 Ensure 'User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode' is set to 'Prompt for consent on the secure desktop' or higherCIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.17.4 (L1) Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3.17.6 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file contentCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - init core file contentCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_SETID_ENABLED is set to yesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_INIT_PATTERN is set to coreCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.4 Ensure that each role for each MongoDB database is needed and grants only the necessary privilegesCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - clusterAdminCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - dbAdminAnyDatabaseCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - dbOwnerCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - hostManagerCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

3.6 Review Superuser/Admin Roles - readWriteAnyDatabaseCIS MongoDB Database Audit L2 v1.0.0MongoDB

ACCESS CONTROL

5.5 Ensure root login is restricted to system consoleCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

5.5 NFS - 'cifs.nfs_root_ignore_acl = on'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

6.1.11 Audit SUID executablesCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.1.12 Audit SGID executablesCIS SUSE Linux Enterprise Workstation 11 L1 v2.1.1Unix

ACCESS CONTROL

6.1.12 Audit SGID executablesCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

ACCESS CONTROL

6.2.9 Ensure root is the only UID 0 accountCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

6.9 Restrict FTP UseCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

6.9 Restrict FTP UseCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

6.9 Restrict FTP Use - /etc/ftpd/ftpusersCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allowCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

6.14 Restrict root Login to System Console - CONSOLE = /dev/consoleCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

8.2.7 Prevent unauthorized connection of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

9.1 Check for Remote ConsolesCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.1 Check for Remote ConsolesCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

18.6.11.4 Ensure 'Require domain users to elevate when setting a network's location' is set to 'Enabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

18.7.5 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

18.9.27.4 (L1) Ensure 'Turn off app notifications on the lock screen' is set to 'Enabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

18.9.27.6 (L1) Ensure 'Turn on convenience PIN sign-in' is set to 'Disabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

18.10.14.2 (L1) Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

18.10.14.2 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

18.10.14.2 Ensure 'Enumerate administrator accounts on elevation' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

Apply UAC restrictions to local accounts on network logonsMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

Ensure nodev option set on /home partitionTenable Cisco Firepower Management Center OS Best Practices AuditUnix

ACCESS CONTROL

Enumerate administrator accounts on elevationMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

ESXi : enable-strict-lockdown-modeVMWare vSphere 6.0 Hardening GuideVMware

ACCESS CONTROL

Network access: Restrict anonymous access to Named Pipes and SharesMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

User Account Control: Behavior of the elevation prompt for standard usersMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

User Account Control: Detect application installations and prompt for elevationMSCT Windows 11 v24H2 v1.0.0Windows

ACCESS CONTROL

VM : prevent-device-interaction-connectVMWare vSphere 6.0 Hardening GuideVMware

ACCESS CONTROL