Item Search

NameAudit NamePluginCategory
1.5.3 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Defender Antivirus v1.0.0 L1 WorkstationWindows

CONFIGURATION MANAGEMENT

1.6.10 Ensure system-wide crypto policies are in effectCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

1.214 RHEL-09-255064CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

1.217 RHEL-09-255075CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

2.1 Ensure that IP addresses are mapped to usernamesCIS Palo Alto Firewall 11 v1.2.0 L2Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.1 Ensure 'Set time and date automatically' Is Enabled - Set time and date automaticallyCIS Apple macOS 10.14 v2.0.0 L1Unix

AUDIT AND ACCOUNTABILITY

2.2.34 Ensure 'Profile single process' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1Windows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

ACCESS CONTROL

2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

ACCESS CONTROL

5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire'CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

18.10.42.5.2 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Windows Server 2022 v5.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.10.42.5.2 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Windows Server 2022 v5.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.10.42.5.2 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Windows Server 2025 v2.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.10.42.5.2 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Windows 11 Enterprise v5.0.1 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.42.5.2 Ensure 'Join Microsoft MAPS' is set to 'Enabled: Advanced'CIS Microsoft Windows Server 2025 v2.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

49.20 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

ACCESS CONTROL

49.20 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL

89.26 (L1) Ensure 'Profile Single Process' is set to 'Administrators'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

CD12-00-002700 - PostgreSQL must provide an immediate alert to appropriate support staff of all audit log failures.DISA STIG Crunchy Data PostgreSQL DB v3r1PostgreSQLDB

AUDIT AND ACCOUNTABILITY

DTAM091 - McAfee VirusScan On-Access Scanner General Settings must be configured to block the connection when a threatened file is detected in a shared folder.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM092 - McAfee VirusScan On-Access Scanner General Settings must be configured to unblock connections after a minimum of 30 minutes.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM093 - McAfee VirusScan On-Access General Policies must be configured to block the connection when a file with a potentially unwanted program is detected in a shared folder.DISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM093 - McAfee VirusScan On-Access Scanner General Settings must be configured to block the connection when a file with a potentially unwanted program is detected in a shared folder.DISA McAfee VirusScan 8.8 Local Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

JUSX-DM-000060 - For local logging, the Juniper SRX Services Gateway must generate a message to the system management console when a log processing failure occurs.DISA Juniper SRX Services Gateway NDM v3r3Juniper

ACCESS CONTROL, CONFIGURATION MANAGEMENT

JUSX-IP-000010 - The Juniper Networks SRX Series Gateway IDPS must install updates for predefined signature objects, applications signatures, IDPS policy templates, and device software when new releases are available in accordance with organizational configuration management policy and procedures.DISA Juniper SRX Services Gateway IDPS v2r1Juniper

SYSTEM AND INFORMATION INTEGRITY

O19C-00-006000 - Oracle Database must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA Oracle Database 19c STIG v1r3 UnixUnix

AUDIT AND ACCOUNTABILITY

O19C-00-006000 - Oracle Database must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA Oracle Database 19c STIG v1r3 WindowsWindows

AUDIT AND ACCOUNTABILITY

O112-N2-008601 - Disk space used by audit trail(s) must be monitored; audit records must be regularly or continuously offloaded to a centralized log management system.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

AUDIT AND ACCOUNTABILITY

PGS9-00-002700 - PostgreSQL must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA STIG PostgreSQL 9.x on RHEL DB v2r5PostgreSQLDB

AUDIT AND ACCOUNTABILITY

RHEL-10-300030 - RHEL 10 must be configured so that Secure Shell (SSH) clients use only DOD-approved encryption ciphers employing FIPS 140-3-validated cryptographic hash algorithms to protect the confidentiality of SSH client connections.DISA Red Hat Enterprise Linux 10 STIG v1r1Unix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-021300 - SQL Server must protect data at rest and ensure confidentiality and integrity of data.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-021300 - SQL Server must protect data at rest and ensure confidentiality and integrity of data.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

SQL4-00-033500 - SQL Server or software monitoring SQL Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQLI-22-011100 - SQL Server must provide an immediate real-time alert to appropriate support staff of all audit log failures.DISA Microsoft SQL Server 2022 Instance STIG v1r4 MS_SQLDBMS_SQLDB

AUDIT AND ACCOUNTABILITY