Item Search

NameAudit NamePluginCategory
1.4.3 SNMP TrapsCIS HPE Aruba Networking CX Switch v1.0.1 L2ArubaOS

AUDIT AND ACCOUNTABILITY

1.4.3 SNMP TrapsCIS HPE Aruba Networking CX Switch v1.0.1 Optional Security RecommendationsArubaOS

AUDIT AND ACCOUNTABILITY

1.18 RHEL-09-212045CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.57 OL08-00-010360CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

3.3.2 Configure Storm ControlCIS Cisco NX-OS v1.2.0 L2Cisco

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT, CONTINGENCY PLANNING, INCIDENT RESPONSE, PLANNING, PROGRAM MANAGEMENT, SYSTEM AND SERVICES ACQUISITION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.6 (L1) Ensure 'Control how Chrome Cleanup reports data to Google' is set to 'Disabled'CIS Google Chrome L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

5.1.30 Ensure sshd is configured to use only FIPS-validated key exchange algorithmsCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and EnabledCIS Apache HTTP Server 2.4 v2.3.0 L2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

89.30 (L1) Ensure 'Profile System Performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

DTAVSEL-105 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to scan all file types.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

SYSTEM AND INFORMATION INTEGRITY

Host versionTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List non-default VM templatesTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List patchesTNS Citrix HypervisorUnix

SYSTEM AND INFORMATION INTEGRITY

List physical storage locationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List running VMsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List security rolesTNS Citrix HypervisorUnix

ACCESS CONTROL

List usersTNS Citrix HypervisorUnix

ACCESS CONTROL

List virtual disksTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VLANsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM CPU allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

List VM memory allocationsTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

NTP client configuredTNS Citrix HypervisorUnix

AUDIT AND ACCOUNTABILITY

Only allow access to required network servicesTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010421 - RHEL 8 must clear the page allocator to prevent use-after-free attacks.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-10-200570 - RHEL 10 must have the "policycoreutils" package installed.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

The hosts.allow file limits access to the local networkTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

TNS_BestPractice_Citrix_Hypervisor.auditTNS Citrix HypervisorUnix
UBTU-18-010516 - The Ubuntu operating system must be configured so that a file integrity tool verifies the correct operation of security functions every 30 days.DISA STIG Ubuntu 18.04 LTS v2r15Unix

SYSTEM AND INFORMATION INTEGRITY

XAPI SSL certificate is in default locationTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT

XenServer - Host versionTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List bonded NIC groupsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List crash dumpsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List networksTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List non-default VM templatesTNS Citrix XenServerUnix
XenServer - List physical storage locationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List running VMsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List usersTNS Citrix XenServerUnix

ACCESS CONTROL

XenServer - List virtual disksTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VM CPU allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - List VM memory allocationsTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - NTP client configuredTNS Citrix XenServerUnix

AUDIT AND ACCOUNTABILITY

XenServer - Only allow access to required network servicesTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

XenServer - Review accounts used to mount remote storageTNS Citrix XenServerUnix

CONFIGURATION MANAGEMENT

XenServer - The hosts.allow file limits access to the local networkTNS Citrix XenServerUnix

SYSTEM AND COMMUNICATIONS PROTECTION