| 1.1.1.1.7 Ensure enhanced weak passcode detection is set to enabled | CIS Zoom L2 v1.0.0 | Zoom | CONFIGURATION MANAGEMENT |
| 1.21 Ensure 'Improve harmful app detection' is set to Enabled | MobileIron - CIS Google Android 7 v1.0.0 L1 | MDM | |
| 1.21 Ensure 'Improve harmful app detection' is set to Enabled | AirWatch - CIS Google Android 7 v1.0.0 L1 | MDM | |
| 3.1.1.1.4 Ensure use enhanced weak password detection is set to enabled | CIS Zoom L2 v1.0.0 | Zoom | CONFIGURATION MANAGEMENT |
| 6.2 Ensure a secure antivirus profile is applied to all relevant security policies | CIS Palo Alto Firewall 7 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
| 6.2 Ensure a secure antivirus profile is applied to all relevant security policies | CIS Palo Alto Firewall 6 Benchmark L1 v1.0.0 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled | CIS Apache HTTP Server 2.4 v2.3.0 L2 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active Rules | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active Rules | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly Threshold | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia Level | CIS Apache HTTP Server 2.2 L2 v3.6.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia Level | CIS Apache HTTP Server 2.2 L2 v3.6.0 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
| 6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories | CIS Palo Alto Firewall 10 v1.3.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
| 6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories | CIS Palo Alto Firewall 11 v1.2.0 L1 | Palo_Alto | SYSTEM AND INFORMATION INTEGRITY |
| 6.20 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories - continue on the URL categories | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
| 6.20 Ensure that User Credential Submission uses the action of block or continue on the URL categories | CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0 | Palo_Alto | CONFIGURATION MANAGEMENT |
| DTBI715 - Crash Detection must be enforced. | DISA STIG Microsoft Internet Explorer 9 v1r15 | Windows | CONFIGURATION MANAGEMENT |
| Ensure 'threat-detection statistics' is set to 'tcp-intercept' | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | SYSTEM AND COMMUNICATIONS PROTECTION |
| Ensure 'threat-detection statistics' is set to 'tcp-intercept' | Tenable Cisco Firepower Best Practices Audit | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
| JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session. | DISA Juniper SRX Services Gateway VPN v3r2 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
| SonicWALL - Detection Prevention - ICMP packets | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
| SonicWALL - Security Services - Client AV - Enabled | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND INFORMATION INTEGRITY |
| SonicWALL - Security Services - Gateway AV - Activated | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND INFORMATION INTEGRITY |
| SYMP-AG-000540 - Symantec ProxySG must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints. | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000001 - Microsoft Defender AV must be configured to block the Potentially Unwanted Application (PUA) feature. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000003 - Microsoft Defender AV must be configured to automatically take action on all detected tasks. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000005 - Microsoft Defender AV must be configured to not exclude files for scanning. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000007 - Microsoft Defender AV must be configured to enable the Automatic Exclusions feature. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000011 - Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000012 - Microsoft Defender AV must be configured for protocol recognition for network protection. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000016 - Microsoft Defender AV must be configured to not allow override of behavior monitoring. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000017 - Microsoft Defender AV Group Policy settings must take priority over the local preference settings. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000018 - Microsoft Defender AV must monitor for incoming and outgoing files. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000019 - Microsoft Defender AV must be configured to monitor for file and program activity. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000021 - Microsoft Defender AV must be configured to always enable real-time protection. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000024 - Microsoft Defender AV must be configured to scan archive files. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000026 - Microsoft Defender AV must be configured to perform a weekly scheduled scan. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000030 - Microsoft Defender AV must be configured to check for definition updates daily. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |
| WNDF-AV-000033 - Microsoft Defender AV must be configured block Office applications from creating child processes. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000034 - Microsoft Defender AV must be configured block Office applications from creating executable content. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000035 - Microsoft Defender AV must be configured to block Office applications from injecting into other processes. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000043 - Microsoft Defender AV must block Adobe Reader from creating child processes. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000045 - Microsoft Defender AV must block untrusted and unsigned processes that run from USB. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000047 - Microsoft Defender AV must audit process creations originating from PSExec and WMI commands. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000052 - Microsoft Defender AV must configure local administrator merge behavior for lists. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000054 - Microsoft Defender AV must control whether exclusions are visible to Local Admins. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
| WNDF-AV-000072 - Microsoft Defender AV must scan excluded files and directories during quick scans. | DISA Microsoft Defender Antivirus STIG v2r8 | Windows | SYSTEM AND INFORMATION INTEGRITY |