Item Search

NameAudit NamePluginCategory
1.2 Ensure Installation of Binary PackagesCIS PostgreSQL 11 OS v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths and sub-paths'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

2.07 otrace - 'Disable' - no directoryCIS v1.1.0 Oracle 11g OS Windows Level 1Windows

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/hostsCIS Ubuntu Linux 18.04 LXD Host L2 Server v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - /etc/networkCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl hostsCIS Ubuntu Linux 18.04 LXD Host L2 Server v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl hostsCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl issue.netCIS Ubuntu Linux 18.04 LXD Host L2 Server v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl issue.netCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - auditctl networkCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - issueCIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.5 Ensure events that modify the system's network environment are collected - sethostname (32-bit)CIS Ubuntu Linux 18.04 LXD Host L2 Workstation v1.0.0Unix

CONFIGURATION MANAGEMENT

4.1.6 Ensure events that modify the system's network environment are collected - '/etc/hosts'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - '/etc/issue.net'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - '/etc/sysconfig/network'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - 'auditctl issue.net'CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - 'auditctl sethostname/setdomainname'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - 'sethostname/setdomainname'CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - /etc/hostsCIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - /etc/networkCIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl '/etc/hosts'CIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl '/etc/issue'CIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl '/etc/network'CIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl 'issue.net'CIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl 'sethostname setdomainname'CIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl 'sethostname setdomainname' x64CIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl /etc/hostsCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl /etc/sysconfig/networkCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - auditctl b32 sethostnameCIS SUSE Linux Enterprise Server 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - b64 sethostnameCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - issue.netCIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - sethostname setdomainnameCIS Debian 8 Workstation L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.1.6 Ensure events that modify the system's network environment are collected - sethostname setdomainname x64CIS Debian 8 Server L2 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

5.3.7 Record Events That Modify the System's Network Environment - /etc/issueCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.7 Record Events That Modify the System's Network Environment - /etc/issue.netCIS Red Hat Enterprise Linux 5 L2 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.200 - Network - Mapper I/O Driver - AllowLLTDIOOnPublicNetDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

5.200 - Network - Mapper I/O Driver - ProhibitLLTDIOOnPrivateNetDISA Windows Vista STIG v6r41Windows

CONFIGURATION MANAGEMENT

8.1.6 Record Events That Modify the System's Network Environment - '/etc/hosts'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.1.6 Record Events That Modify the System's Network Environment - /etc/issueCIS Debian Linux 7 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.1.6 Record Events That Modify the System's Network Environment - 32 bit system-localeCIS Debian Linux 7 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.1.6 Record Events That Modify the System's Network Environment - 64 bit system-localeCIS Debian Linux 7 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

8.1.6 Record Events That Modify the System's Network Environment- '/etc/issue.net'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

8.1.6 Record Events That Modify the System's Network Environment- '32bit sethostname'CIS Ubuntu 12.04 LTS Benchmark L2 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

DTAVSEL-011 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner maximum scan time must not be less than 45 seconds - default.scanMaxTmoMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-011 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner maximum scan time must not be less than 45 seconds - scanMaxTmoMcAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

Ensure events that modify the system's network environment are collected - /etc/issueTenable Cisco Firepower Management Center OS Best Practices AuditUnix

AUDIT AND ACCOUNTABILITY

GOOG-15-006700 - Google Android 15 allow list must be configured to not include applications with the following characteristics:MobileIron - DISA Google Android 15 COPE v1r2MDM

IDENTIFICATION AND AUTHENTICATION

WA000-WI6030 IIS6 - The Limit the kernel request queue monitor must be enabledDISA STIG IIS 6.0 Site Checklist v6r16Windows

CONFIGURATION MANAGEMENT