Item Search

NameAudit NamePluginCategory
1.1.2 Ensure 'Login Banner' is setCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

AWARENESS AND TRAINING, PROGRAM MANAGEMENT

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

ACCESS CONTROL

1.3.1 Ensure 'Minimum Password Complexity' is enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.3.5 Ensure 'Minimum Numeric Letters' is greater than or equal to 1CIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.3.10 Ensure 'Password Profiles' do not existCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.4 (L1) Host hardware must enable and configure a TPM 2.0CIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

CONFIGURATION MANAGEMENT, MAINTENANCE

1.6.1 Ensure 'Verify Update Server Identity' is enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.6.2 Ensure redundant NTP servers are configured appropriatelyCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY

2.1 (L1) Host must run software that has not reached End of General Support statusCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

SYSTEM AND SERVICES ACQUISITION

2.2 Ensure that WMI probing is disabledCIS Palo Alto Firewall 11 v1.2.0 L2Palo_Alto

CONFIGURATION MANAGEMENT

2.4 (L1) Host image profile acceptance level must be PartnerSupported or higherCIS VMware ESXi 8.0 v1.2.0 L1 UnixUnix

SYSTEM AND SERVICES ACQUISITION

2.7 (L1) Host must have time synchronization services enabled and runningCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

AUDIT AND ACCOUNTABILITY

2.9 (L1) Host must not suppress warnings about unmitigated hyperthreading vulnerabilitiesCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

AUDIT AND ACCOUNTABILITY

2.10 (L1) Host must restrict inter-VM transparent page sharingCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

2.11 (L1) Host must use sufficient entropy for cryptographic operationsCIS VMware ESXi 8.0 v1.2.0 L1 UnixUnix

CONFIGURATION MANAGEMENT, MAINTENANCE

3.2 (L1) Host must deactivate the ESXi shellCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

CONFIGURATION MANAGEMENT

3.3 Configure remote logging for ESXi hostsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

3.5 (L1) Host must deactivate CIMCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

CONFIGURATION MANAGEMENT

3.9 (L1) Host must automatically deactivate shell servicesCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

ACCESS CONTROL

3.11 (L1) Host must enforce password complexityCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

IDENTIFICATION AND AUTHENTICATION

4.1 (L1) Host must configure a persistent log location for all locally stored system logsCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

AUDIT AND ACCOUNTABILITY

4.2 Ensure 'Applications and Threats Update Schedule' is set to download and install updates at daily or shorter intervalsCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.2 Establish a password policy for password complexityCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

IDENTIFICATION AND AUTHENTICATION

4.11 (L1) Host must use strict x509 verification for TLS-enabled remote logging endpointsCIS VMware ESXi 8.0 v1.2.0 L1 VMwareVMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

5.1 Disable DCUI to prevent local administrative controlCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

5.3 Disable SSHCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

5.3 Ensure forwarding of decrypted content to WildFire is enabledCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Enable OCSP and CRL certificate checking - OCSPStyleCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

5.6 Ensure 'WildFire Update Schedule' is set to download and install updates in real-timeCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.8 Set a timeout for Shell ServicesCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

6.3 Mask and zone SAN resources appropriatelyCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
6.5.1 (L1) Host SSH daemon, if enabled, must use FIPS 140-2/140-3 validated ciphersCIS VMware ESXi 8.0 v1.2.0 L1 UnixUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.10 Ensure that access to every URL is loggedCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND COMMUNICATIONS PROTECTION

6.22 Ensure that 'Inline Cloud Analysis' on Vulnerability Protection profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

RISK ASSESSMENT

6.24 Ensure that 'Inline Cloud Analysis' on Anti-Spyware profiles are enabled if 'Advanced Threat Prevention' is availableCIS Palo Alto Firewall 11 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

7.2 Ensure that the vSwitch MAC Address Change policy is set to rejectCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure that the vSwitch Promiscuous Mode policy is set to rejectCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

7.4 Ensure that port groups are not configured to the value of the native VLANCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
8.1.1 Limit informational messages from the VM to the VMX fileCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY

8.3.4 Use templates to deploy VMs whenever possibleCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
8.4.3 Control VMsafe Agent PortCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

SYSTEM AND INFORMATION INTEGRITY

8.4.4 Control VMsafe Agent ConfigurationCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

SYSTEM AND INFORMATION INTEGRITY

8.4.5 Disable AutologonCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

ACCESS CONTROL

8.4.6 Disable BIOS BBSCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.22 Disable Guest Host Interaction Launch MenuCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.23 Disable memSchedFakeSampleStatsCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

CONFIGURATION MANAGEMENT

8.4.25 Disable VM Console Drag and Drop operationsCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

CONFIGURATION MANAGEMENT

8.4.29 Disable all but VGA mode on virtual machines.CIS VMware ESXi 5.5 v1.2.0 Level 2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

8.6.1 Avoid using nonpersistent disksCIS VMware ESXi 5.5 v1.2.0 Level 2VMware

AUDIT AND ACCOUNTABILITY

8.7.4 Limit VM log file sizeCIS VMware ESXi 5.5 v1.2.0 Level 1VMware

AUDIT AND ACCOUNTABILITY