Item Search

NameAudit NamePluginCategory
1.15.2 Ensure 'Specify threat alert levels at which default action should not be taken when detected' is set to 'Enabled: Medium: 2 or 3'CIS Microsoft Defender Antivirus v1.0.0 L1 WorkstationWindows

SYSTEM AND INFORMATION INTEGRITY

1.15.2 Ensure 'Specify threat alert levels at which default action should not be taken when detected' is set to 'Enabled: Medium: 2 or 3'CIS Microsoft Defender Antivirus v1.0.0 L1 ServerWindows

SYSTEM AND INFORMATION INTEGRITY

2.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iOS 14 and iPadOS 14 v1.0.0 End User Owned L1MDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 17 Benchmark v1.1.0 End User Owned L1MDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 26 Benchmark v1.0.0 L1 End User OwnedMDM

ACCESS CONTROL

2.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL

3.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iOS 10 v2.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.4.3 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iPadOS 26 v1.0.0 L1 Institutionally OwnedMDM

ACCESS CONTROL

3.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessAirWatch - CIS Apple iOS 18 v2.0.0 L1 Institution OwnedMDM

ACCESS CONTROL

3.4.4 Ensure 'Maximum Auto-Lock' is set to '2 minutes' or lessMobileIron - CIS Apple iPadOS 17 Institutionally Owned L1MDM

ACCESS CONTROL

5.1.4 Set 'Allow users to demote attachments to Level 2' to 'Disabled'CIS MS Office Outlook 2010 v1.0.0Windows

CONFIGURATION MANAGEMENT

5.4.1.9 Ensure existing passwords use FIPS 140-2 approved cryptographic hashing algorithmCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

18.3.2 (L1) Ensure 'Do not allow password expiration time longer than required by policy' is set to 'Enabled' (MS only)CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

18.9.52.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

18.10.50.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v5.0.0 L2Windows

CONFIGURATION MANAGEMENT

18.10.51.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.51.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.51.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

AIX7-00-001134 - The password hashes stored on AIX system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.DISA STIG AIX 7.x v3r1Unix

CONFIGURATION MANAGEMENT

Android Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Encryption on storage cardsTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Device Configuration - PasswordTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Removable storageTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Required password typeTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - CameraTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Contact sharing via BluetoothTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Copy and paste between work and personal profilesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Maximum minutes of inactivity until work profile locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Work Profile Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Prevent app installations from unknown sources in the personal profileTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

CIS_Docker_1.6_v1.0.0_L2_Docker.audit Level 2CIS Docker 1.6 v1.0.0 L2 DockerUnix
ESXI-06-000033 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm.DISA VMware vSphere ESXi 6.0 STIG v1r5 UnixUnix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes - CRYPT_ALGORITHMS_ALLOWDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA STIG AIX 6.1 v1r14Unix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

IDENTIFICATION AND AUTHENTICATION

GEN000590 - The system must use a FIPS 140-2 approved cryptographic hashing algorithm for generating account password hashes.DISA AIX 5.3 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - Password hashes must have been generated using a FIPS 140-2 hashing algorithm - 'no password hashes in /etc/security/passwd'DISA STIG AIX 6.1 v1r14Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - Password hashes must have been generated using a FIPS 140-2 hashing algorithm - 'no password hashes in /etc/security/passwd'DISA AIX 5.3 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - Password hashes must have been generated using a FIPS 140-2 hashing algorithm - 'Verify no password hashes in /etc/passwd'DISA AIX 5.3 STIG v1r2Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - Password hashes must have been generated using a FIPS 140-2 hashing algorithm - 'Verify no password hashes in /etc/passwd'DISA STIG AIX 6.1 v1r14Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - /etc/passwdDISA STIG Solaris 10 X86 v2r4Unix

IDENTIFICATION AND AUTHENTICATION

GEN000595 - The password hashes stored on the system must have been generated using a FIPS 140-2 approved cryptographic hashing algorithm - /etc/shadowDISA STIG Solaris 10 SPARC v2r4Unix

IDENTIFICATION AND AUTHENTICATION

IBM i : Automatic Configuration of Virtual Devices (QAUTOVRT) - '0'IBM System i Security Reference for V7R1 and V6R1AS/400

SYSTEM AND COMMUNICATIONS PROTECTION

IBM i : Automatic Configuration of Virtual Devices (QAUTOVRT) - '0'IBM System i Security Reference for V7R2AS/400

SYSTEM AND COMMUNICATIONS PROTECTION