1.5.1 Ensure core dump storage is disabled | CIS Fedora 28 Family Linux Server L1 v2.0.0 | Unix | ACCESS CONTROL |
1.5.2 Ensure core dumps are restricted | CIS Ubuntu Linux 18.04 LTS v2.2.0 L1 Server | Unix | ACCESS CONTROL |
1.5.3 Ensure core dumps are restricted | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
2.3.5.1 (L1) Ensure 'Domain controller: Allow server operators to schedule tasks' is set to 'Disabled' (DC only) | CIS Windows Server 2012 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.10.5 (L1) Ensure 'Network access: Let Everyone permissions apply to anonymous users' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 | Windows | ACCESS CONTROL |
2.3.10.10 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.11.2 (L1) Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Windows Server 2012 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.11.2 Ensure 'Network security: Allow LocalSystem NULL session fallback' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.5 (L1) Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.17.6 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' | CIS Windows Server 2012 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.17.6 (L1) Ensure 'User Account Control: Run all administrators in Admin Approval Mode' is set to 'Enabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
2.3.17.6 Ensure 'User Account Control: Only elevate UIAccess applications that are installed in secure locations' is set to 'Enabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
2.3.17.7 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
4.10.26.3 (L1) Ensure 'Do not enumerate connected users on domain-joined computers' is set to 'Enabled' | CIS Microsoft Intune for Windows 11 v4.0.0 L1 | Windows | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Debian Linux 11 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.4.2.1 Ensure root is the only UID 0 account | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Workstation | Unix | ACCESS CONTROL |
6.2.10 Ensure root is the only UID 0 account | CIS Debian 10 Workstation L1 v2.0.0 | Unix | ACCESS CONTROL |
18.7.10 Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MS | Windows | ACCESS CONTROL |
18.9.27.5 (L1) Ensure 'Turn off picture password sign-in' is set to 'Enabled' | CIS Windows Server 2012 DC L1 v3.0.0 | Windows | ACCESS CONTROL |
49.19 (L1) Ensure 'Network access: Restrict anonymous access to Named Pipes and Shares' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v4.0.0 L1 | Windows | ACCESS CONTROL |
49.33 (L1) Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v4.0.0 L1 | Windows | ACCESS CONTROL |
Allow user control over installs | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Always install with elevated privileges - AlwaysInstallElevated | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
Configure Windows Defender SmartScreen - ShellSmartScreenLevel | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Disallow WinRM from storing RunAs credentials - Service - DisableRunAs | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
Enumerate local users on domain-joined computers | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
Enumerate local users on domain-joined computers | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
Join Microsoft MAPS | MSCT Windows 11 v24H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Do not allow anonymous enumeration of SAM accounts | MSCT Windows 11 v24H2 v1.0.0 | Windows | ACCESS CONTROL |
Network access: Restrict anonymous access to Named Pipes and Shares - RestrictNullSessAccess | MSCT Windows Server 2025 DC v1.0.0 | Windows | ACCESS CONTROL |
Network access: Restrict clients allowed to make remote calls to SAM | MSCT Windows 11 v24H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn off toast notifications on the lock screen | MSCT Windows 11 v24H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLogging | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account - FilterAdministratorToken | MSCT Windows Server 2025 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Admin Approval Mode for the Built-in Administrator account - FilterAdministratorToken | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode - ConsentPromptBehaviorAdmin | MSCT Windows Server 2025 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for standard users | MSCT Windows 11 v22H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for standard users | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Behavior of the elevation prompt for standard users - ConsentPromptBehaviorUser | MSCT Windows Server 2025 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Detect application installations and prompt for elevation | MSCT Windows 11 v23H2 v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Only elevate UIAccess applications that are installed in secure locations - EnableSecureUIAPaths | MSCT Windows Server 2025 DC v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Only elevate UIAccess applications that are installed in secure locations - EnableSecureUIAPaths | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |
User Account Control: Run all administrators in Admin Approval Mode - EnableLUA | MSCT Windows Server 2025 MS v1.0.0 | Windows | ACCESS CONTROL |