Item Search

NameAudit NamePluginCategory
1.2.1 Set 'privilege 1' for local users - 'No users with privileges 2-15'CIS Cisco IOS 12 L1 v4.0.0Cisco

ACCESS CONTROL

2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2025 v1.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.13 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Member ServerWindows

ACCESS CONTROL

2.3.10.13 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL

4.1.1.1 Ensure auditd is installedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.1.3 Ensure auditing for processes that start prior to auditd is enabledCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.2.1 Ensure audit log storage size is configuredCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.2.5 Ensure system is disabled when audit logs are fullCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.2.7 Ensure audit_backlog_limit is sufficientCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.3 Ensure session initiation information is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.5 Ensure events that modify the system's network environment are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.6 Ensure successful file system mounts are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.7 Ensure kernel module loading and unloading is collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.9 Ensure file deletion events by users are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.11 Ensure unsuccessful unauthorized file access attempts are collectedCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

4.1.3.41 Ensure the audit configuration is immutableCIS Amazon Linux 2 STIG v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.3.2 Remove mail related ESPs - sybmail.dllCIS Sybase 15.0 L2 OS Windows v1.1.0Windows

CONFIGURATION MANAGEMENT

Android Compliance Policy - Block apps from unknown sourcesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Compliance Policy - Maximum minutes of inactivity before password is requiredTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Compliance Policy - Minimum password lengthTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - Google backupTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Add and remove accountsTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Contact sharing via BluetoothTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Work Profile Device Configuration - Maximum minutes of inactivity until screen locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Work Profile Device Configuration - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Work profile notifications while device lockedTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - AirDropTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - CameraTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Changes to app cellular data usage settingsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Game CenterTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Maximum minutes after screen lock before password is requiredTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL

iOS Device Management - Passcode modificationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - PasswordTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Prevent reuse of previous passwordsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Required password typeTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

iOS Device Management - Share usage dataTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Today view while device lockedTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Wallet notifications while device lockedTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Compliance Policy - Maximum minutes of inactivity before password is requiredTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Compliance Policy - Required password typeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

macOS Compliance Policy - Simple passwords.Tenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Maximum minutes after screen lock before password is requiredTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL

macOS Device Management - Prevent reuse of previous passwordsTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

macOS Device Management - Required password typeTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

O365-OU-000017 - Level 1 file attachments must be blocked from being delivered.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Windows Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Removable storageTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Required password typeTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Scan scripts loaded in Microsoft web browsersTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT