Item Search

NameAudit NamePluginCategory
1.4.2 Ensure 'Default file format' is set to Enabled (Access 2007)CIS Microsoft Office Access 2016 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.4.2 Ensure 'Default file format' is set to Enabled (Access 2007)CIS Microsoft Office Access 2013 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.21 Ensure 'Improve harmful app detection' is set to EnabledMobileIron - CIS Google Android 7 v1.0.0 L1MDM
1.21 Ensure 'Improve harmful app detection' is set to EnabledAirWatch - CIS Google Android 7 v1.0.0 L1MDM
2.1.4.1 (L1) Ensure 'Default file format' is set to 'Enabled: Access 2007'CIS Microsoft Intune for Office v1.1.0 L1Windows

CONFIGURATION MANAGEMENT

2.1.4.1 Ensure 'Default file format' is set to 'Enabled: Access 2007'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT

3.1.1.1.4 Ensure use enhanced weak password detection is set to enabledCIS Zoom L2 v1.0.0Zoom

CONFIGURATION MANAGEMENT

4.6.2 Ensure BFD Authentication is Not Set to Loose-CheckCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and EnabledCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Active RulesCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Inbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Outbound Anomaly ThresholdCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelCIS Apache HTTP Server 2.2 L2 v3.6.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.7 Ensure the OWASP ModSecurity Core Rule Set Is Installed and Enabled - Paranoia LevelCIS Apache HTTP Server 2.2 L2 v3.6.0 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

6.19 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categoriesCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.20 Ensure that User Credential Submission uses the action of block or continue on the URL categoriesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system'CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND INFORMATION INTEGRITY

20.66 Ensure 'The system uses a host-based intrusion detection or prevention system' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - basic-threatDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CASA-FW-000300 - The Cisco ASA must be configured to generate an alert that can be forwarded to organization-defined personnel and/or the firewall administrator when denial-of-service (DoS) incidents are detected - logging severityDISA STIG Cisco ASA FW v2r1Cisco

SYSTEM AND INFORMATION INTEGRITY

CISC-L2-000190 - The Cisco switch must enable Unidirectional Link Detection (UDLD) to protect against one-way connections.DISA STIG Cisco NX-OS Switch L2S v3r2Cisco

CONFIGURATION MANAGEMENT

Configure detection for potentially unwanted applicationsMSCT Windows Server 2025 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

DTBI715 - Crash Detection must be enforced.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

CONFIGURATION MANAGEMENT

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.DISA Juniper SRX Services Gateway VPN v3r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

O365-WD-000011 - Open/Save of Word 2007 and later binary documents and templates must be blocked.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SonicWALL - Detection Prevention - ICMP packetsTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000540 - Symantec ProxySG must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000320 - Symantec ProxySG must enable Attack Detection.DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000001 - Microsoft Defender AV must be configured to block the Potentially Unwanted Application (PUA) feature - PUA feature.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000006 - Microsoft Defender AV must be configured to not exclude files opened by specified processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000008 - Microsoft Defender AV must be configured to disable local setting override for reporting to Microsoft MAPS.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000011 - Microsoft Defender AV must be configured to only send safe samples for MAPS telemetry.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000014 - Microsoft Defender AV must be configured to not allow override of monitoring for incoming and outgoing file activity.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000017 - Microsoft Defender AV Group Policy settings must take priority over the local preference settings.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000023 - Microsoft Defender AV must be configured to process scanning when real-time protection is enabled.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND INFORMATION INTEGRITY

WNDF-AV-000032 - Microsoft Defender AV must be configured to block executable content from email client and webmail.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000035 - Microsoft Defender AV must be configured to block Office applications from injecting into other processes.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000036 - Microsoft Defender AV must be configured to impede JavaScript and VBScript to launch executables.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000038 - Microsoft Defender AV must be configured to block Win32 imports from macro code in Office.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WNDF-AV-000039 - Microsoft Defender AV must be configured to prevent user and apps from accessing dangerous websites.DISA STIG Microsoft Defender Antivirus v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION