Item Search

NameAudit NamePluginCategory
1.2.1.1 Ensure GPG keys are configuredCIS Debian Linux 11 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.1 Ensure GPG keys are configuredCIS Debian Linux 11 v2.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS SUSE Linux Enterprise 15 v2.0.1 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.1.2 Ensure gpgcheck is globally activatedCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure GPG keys are configuredCIS Ubuntu Linux 14.04 LTS Server L1 v2.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Red Hat 6 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.2 Ensure gpgcheck is globally activatedCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.2.3 Ensure gpgcheck is globally activatedCIS SUSE Linux Enterprise 12 v3.2.1 L1 ServerUnix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure GPG keys are configuredCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

1.7.3 Ensure GDM disable-user-list option is enabledCIS Ubuntu Linux 22.04 LTS v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.7.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 7 v4.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS CentOS Linux 7 v4.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.7.3 Ensure GDM disable-user-list option is enabledCIS CentOS Linux 7 v4.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Debian 10 Server L1 v2.0.0Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

1.8.3 Ensure GDM disable-user-list option is enabledCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS SUSE Linux Enterprise 15 v2.0.1 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

1.8.3 Ensure GDM disable-user-list option is enabledCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

DTOO127 - Add-ins to Office applications must be signed by a Trusted PublisherDISA STIG Microsoft Office Access 2016 v1r1Windows

CONFIGURATION MANAGEMENT

FireEye - Login bannerTNS FireEyeFireEye

ACCESS CONTROL

GEN001605 - Run control scripts lists of preloaded libraries must contain only authorized paths - /etc/rc*DISA STIG Solaris 10 SPARC v2r4Unix

CONFIGURATION MANAGEMENT

GEN001610 - Run control scripts lists of preloaded libraries must contain only authorized paths - '/etc/init.d/*'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN001610 - Run control scripts lists of preloaded libraries must contain only authorized paths.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN001850 - Global initialization files lists of preloaded libraries must contain only authorized paths - '/etc/security/environ'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - flags +lo and -loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - naflags +lo and -loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002800 - The audit system must be configured to audit login, logout, and session initiation - naflags loDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

Require that application add-ins are signed by Trusted Publisher - powerpointMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsigMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - excelMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - requireaddinsig - ms projectMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Require that application add-ins are signed by Trusted Publisher - wordMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Review the list of active Rackspace Role Names (RBAC)Tenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

Review the List of Rackspace Users with Admin RolesTenable Best Practices RackSpace v2.0.0Rackspace

ACCESS CONTROL

RHEL-07-010130 - The Red Hat Enterprise Linux operating system must be configured so that when passwords are changed or new passwords are established, the new password must contain at least one lower-case character.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

IDENTIFICATION AND AUTHENTICATION

RHEL-07-021020 - The Red Hat Enterprise Linux operating system must prevent files with the setuid and setgid bit set from being executed on file systems that are being imported via Network File System (NFS).DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

CONFIGURATION MANAGEMENT

SYMP-AG-000660 - Symantec ProxySG providing content filtering must send an alert to, at a minimum, the ISSO and ISSM when detection events occur.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND INFORMATION INTEGRITY

WN16-00-000300 - The roles and features required by the system must be documented.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-00-000270 - Windows Server 2019 must have the roles and features required by the system documented.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT