Item Search

NameAudit NamePluginCategory
2.5.14.3.1.1 Ensure 'Allow users to demote attachments to Level 2' is set to 'Disabled'CIS Microsoft Office Enterprise v1.2.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

3.4 Restrict Zone-Transfers 'Zone Transfer Server 2'CIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND COMMUNICATIONS PROTECTION

6.10 Ensure NAT Gateways are created in at least 2 Availability Zones - Subnet1CIS Amazon Web Services Three-tier Web Architecture L1 1.0.0amazon_aws

SYSTEM AND COMMUNICATIONS PROTECTION

18.5.8.1 Ensure 'Enable insecure guest logons' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.9.24.4 Ensure 'Default Protections for Popular Software' is set to 'Enabled' - opera.exe 2CIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.52.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

18.9.52.1 Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

18.10.14.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.14.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NGWindows

CONFIGURATION MANAGEMENT

18.10.14.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.14.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1 + BLWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

18.10.50.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.50.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.51.1 (L1) Ensure 'Prevent the usage of OneDrive for file storage' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

CONFIGURATION MANAGEMENT

19.7.40.1 (L1) Ensure 'Turn off Windows Copilot' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

67.3 (L2) Ensure 'Disable One Drive File Sync' is set to 'Sync Disabled'CIS Microsoft Intune for Windows 11 v3.0.1 L2Windows

CONFIGURATION MANAGEMENT

Android Compliance Policy - Password expiration (days)Tenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Compliance Policy - Require a password to unlock mobile devicesTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Device Configuration - CameraTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Google account auto syncTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - PasswordTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Android Work Profile Device Configuration - Maximum minutes of inactivity until work profile locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

Android Work Profile Device Configuration - Required password typeTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

CIS AIX 5.3 and 6.1 v1.1.0 Level 2CIS AIX 5.3/6.1 L2 v1.1.0Unix
ESXI5-VM-000018 - The unexposed feature keyword isolation.tools.memSchedFakeSampleStats.disable must be initialized to decrease the VMs potential attack vectors.DISA STIG VMWare ESXi 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000020 - The unexposed feature keyword isolation.ghi.host.shellAction.disable must be initialized to decrease the VMs potential attack vectors.DISA STIG VMWare ESXi 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000022 - The unexposed feature keyword isolation.tools.trashFolderState.disable must be initialized to decrease the VMs potential attack vectors.DISA STIG VMWare ESXi 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000024 - The unexposed feature keyword isolation.tools.unity.disable must be initialized to decrease the VMs potential attack vectors.DISA STIG VMWare ESXi 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000028 - The unexposed feature keyword isolation.tools.unityActive.disable must be initialized to decrease the VMs potential attack vectors.DISA STIG VMWare ESXi 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

GEN000520 - The root user must not own the logon session for an application requiring a continuous display.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000520 - The root user must not own the logon session for an application requiring a continuous display.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN000520 - The root user must not own the logon session for an application requiring a continuous display.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN000520 - The root user must not own the logon session for an application requiring a continuous display.DISA STIG AIX 6.1 v1r14Unix

ACCESS CONTROL

GEN000520 - The root user must not own the logon session for an application requiring a continuous display.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL

VCPG-67-000015 - VMware Postgres must use FIPS 140-2 approved TLS ciphers.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

IDENTIFICATION AND AUTHENTICATION

VM : disable-unexposed-features-autologonVMWare vSphere 5.X Hardening GuideVMware

ACCESS CONTROL

VM : disable-unexposed-features-shellactionVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-toporequestVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-interlockVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-unity-windowcontentsVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

VM : disable-unexposed-features-versionsetVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 STIG v1r1 MiddlewareUnix

ACCESS CONTROL

WBSP-AS-000211 - The WebSphere Application Server Java 2 security must be enabled.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

Windows Compliance Policy - Block USB debugging on deviceTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Compliance Policy - Maximum minutes of inactivity before password is requiredTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL

Windows Compliance Policy - Number of previous passwords to prevent reuseTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Compliance Policy - Require a password to unlock mobile devicesTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Windows Device Configuration - Behavior monitoringTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

CONFIGURATION MANAGEMENT