Item Search

NameAudit NamePluginCategory
1.19 Ensure 'Improve harmful app detection' is set to 'Enabled'MobileIron - CIS Google Android v1.3.0 L1MDM
4.6.2 Ensure BFD Authentication is Not Set to Loose-CheckCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and EnabledCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - basic-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - logging severityDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - scanning-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA Cisco NX OS Switch L2S STIG v3r2Cisco

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server v2004 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2025 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 10 v2004 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows 11 v24H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

DTAM142 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent modification of McAfee Common Management Agent files and settings.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAM143 - McAfee VirusScan Access Protection Rules Common Standard Protection must be set to prevent modification of McAfee Scan Engine files and settings.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

CONFIGURATION MANAGEMENT

DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - groupMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

ACCESS CONTROL

DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - groupMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

ACCESS CONTROL

DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - userMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5Unix

ACCESS CONTROL

DTAVSEL-202 - The nails user and nailsgroup group must be restricted to the least privilege access required for the intended role - userMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

ACCESS CONTROL

DTBI715 - Crash Detection must be enforced.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

CONFIGURATION MANAGEMENT

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.DISA Juniper SRX Services Gateway VPN v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Detection Prevention - IP TTL DecrementTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Security Services - Client AV - EnabledTNS SonicWALL v5.9SonicWALL

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000001 - Microsoft Defender AV must be configured to block the Potentially Unwanted Application (PUA) feature - PUA feature.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000006 - Microsoft Defender AV must be configured to not exclude files opened by specified processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000011 - Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000017 - Microsoft Defender AV Group Policy settings must take priority over the local preference settings.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000020 - Microsoft Defender AV must be configured to scan all downloaded files and attachments.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000023 - Microsoft Defender AV must be configured to process scanning when real-time protection is enabled.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000032 - Microsoft Defender AV must be configured to block executable content from email client and webmail.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000033 - Microsoft Defender AV must be configured block Office applications from creating child processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000035 - Microsoft Defender AV must be configured to block Office applications from injecting into other processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000036 - Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000038 - Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000039 - Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION