| 1.4.3 SNMP Traps | CIS HPE Aruba Networking CX Switch v1.0.1 L2 | ArubaOS | AUDIT AND ACCOUNTABILITY |
| 1.4.3 SNMP Traps | CIS HPE Aruba Networking CX Switch v1.0.1 Optional Security Recommendations | ArubaOS | AUDIT AND ACCOUNTABILITY |
| 1.18 RHEL-09-212045 | CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT II | Unix | SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
| 1.57 OL08-00-010360 | CIS Oracle Linux 8 STIG v1.0.0 CAT II | Unix | CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY |
| 3.3.2 Configure Storm Control | CIS Cisco NX-OS v1.2.0 L2 | Cisco | AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, INCIDENT RESPONSE, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY |
| 3.6 (L1) Ensure 'Control how Chrome Cleanup reports data to Google' is set to 'Disabled' | CIS Google Chrome L1 v3.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| 5.1.30 Ensure sshd is configured to use only FIPS-validated key exchange algorithms | CIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled | CIS Apache HTTP Server 2.4 v2.3.0 L2 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active Rules | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia Level | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 89.30 (L1) Ensure 'Profile System Performance' is set to 'Administrators, NT SERVICE\WdiServiceHost' | CIS Microsoft Intune for Windows 11 v4.0.0 L1 | Windows | ACCESS CONTROL, AUDIT AND ACCOUNTABILITY |
| DTAVSEL-105 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to scan all file types. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| Host version | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List non-default VM templates | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List patches | TNS Citrix Hypervisor | Unix | SYSTEM AND INFORMATION INTEGRITY |
| List physical storage locations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List running VMs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List security roles | TNS Citrix Hypervisor | Unix | ACCESS CONTROL |
| List users | TNS Citrix Hypervisor | Unix | ACCESS CONTROL |
| List virtual disks | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List VLANs | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List VM CPU allocations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| List VM memory allocations | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| NTP client configured | TNS Citrix Hypervisor | Unix | AUDIT AND ACCOUNTABILITY |
| Only allow access to required network services | TNS Citrix Hypervisor | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-08-010171 - RHEL 8 must have policycoreutils package installed. | DISA Red Hat Enterprise Linux 8 STIG v2r7 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks. | DISA Red Hat Enterprise Linux 8 STIG v2r7 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| RHEL-10-200570 - RHEL 10 must have the "policycoreutils" package installed. | DISA Red Hat Enterprise Linux 10 STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| The hosts.allow file limits access to the local network | TNS Citrix Hypervisor | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| TNS_BestPractice_Citrix_Hypervisor.audit | TNS Citrix Hypervisor | Unix | |
| UBTU-18-010516 - The Ubuntu operating system must be configured so that a file integrity tool verifies the correct operation of security functions every 30 days. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | SYSTEM AND INFORMATION INTEGRITY |
| XAPI SSL certificate is in default location | TNS Citrix Hypervisor | Unix | CONFIGURATION MANAGEMENT |
| XenServer - Host version | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List bonded NIC groups | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List crash dumps | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List networks | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List non-default VM templates | TNS Citrix XenServer | Unix | |
| XenServer - List physical storage locations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List running VMs | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List users | TNS Citrix XenServer | Unix | ACCESS CONTROL |
| XenServer - List virtual disks | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List VM CPU allocations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - List VM memory allocations | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - NTP client configured | TNS Citrix XenServer | Unix | AUDIT AND ACCOUNTABILITY |
| XenServer - Only allow access to required network services | TNS Citrix XenServer | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| XenServer - Review accounts used to mount remote storage | TNS Citrix XenServer | Unix | CONFIGURATION MANAGEMENT |
| XenServer - The hosts.allow file limits access to the local network | TNS Citrix XenServer | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |