Item Search

NameAudit NamePluginCategory
1.1 Ensure the Pre-Installation Planning Checklist Has Been ImplementedCIS Apache HTTP Server 2.4 v2.3.0 L1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

1.1.1.7 Ensure unused filesystems kernel modules are not availableCIS Amazon Linux 2 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS Oracle Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS SUSE Linux Enterprise 15 v2.0.1 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS Oracle Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS Red Hat Enterprise Linux 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS AlmaLinux OS 9 v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.9 Ensure unused filesystems kernel modules are not availableCIS AlmaLinux OS 9 v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.10 Ensure unused filesystems kernel modules are not availableCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.10 Ensure unused filesystems kernel modules are not availableCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.10 Ensure unused filesystems kernel modules are not availableCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.10 Ensure unused filesystems kernel modules are not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.10 Ensure unused filesystems kernel modules are not availableCIS Ubuntu Linux 24.04 LTS v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Debian Linux 13 v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Rocky Linux 8 v3.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Oracle Linux 10 v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Oracle Linux 8 v4.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Oracle Linux 8 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Red Hat Enterprise Linux 10 v1.0.1 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Red Hat Enterprise Linux 10 v1.0.1 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS Red Hat Enterprise Linux 8 v4.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS AlmaLinux OS 10 v1.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

1.1.1.11 Ensure unused filesystems kernel modules are not availableCIS AlmaLinux OS 10 v1.0.0 L1 WorkstationUnix

CONFIGURATION MANAGEMENT

1.24 UBTU-24-100820CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIUnix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

1.63 UBTU-22-255050CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIUnix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

1.64 UBTU-22-255055CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIUnix

ACCESS CONTROL, MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

1.352 RHEL-09-651015CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

2.1.15 (L1) Ensure outbound anti-spam message limits are in placeCIS Microsoft 365 Foundations v6.0.1 L1 E3microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

2.1.15 (L1) Ensure outbound anti-spam message limits are in placeCIS Microsoft 365 Foundations v6.0.1 L1 E5microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows Server 2025 Stand-alone v1.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.10 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow'CIS Microsoft Windows Server 2022 Stand-alone v2.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2016 v4.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.11 (L1) Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only)CIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

ACCESS CONTROL

2.14.1 Audit Game Center SettingsCIS Apple macOS 15.0 Sequoia v2.0.0 L2Unix

CONFIGURATION MANAGEMENT

2.14.1 Audit Game Center SettingsCIS Apple macOS 13.0 Ventura v4.0.0 L2Unix

CONFIGURATION MANAGEMENT

5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.1.28 Ensure the SSH server is configured to use only MACs employing FIPS 140-2-approved algorithmsCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

5.1.29 Ensure the SSH server is configured to use only ciphers employing FIPS 140-2-approved algorithmsCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

ACCESS CONTROL

6.2.3.5 Ensure events that modify the system's network environment are collectedCIS Ubuntu Linux 22.04 LTS v3.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

6.2.3.5 Ensure events that modify the system's network environment are collectedCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

6.2.3.5 Ensure events that modify the system's network environment are collectedCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

6.3.3.5 Ensure events that modify the system's network environment are collectedCIS Ubuntu Linux 20.04 LTS v3.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

Extreme : Device InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Extreme : License InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

JUSX-DM-000059 - The Juniper SRX Services Gateway must generate an immediate system alert message to the management console when a log processing failure is detected.DISA Juniper SRX Services Gateway NDM v3r3Juniper

AUDIT AND ACCOUNTABILITY

O19C-00-012400 - Oracle Database must set the maximum number of consecutive invalid logon attempts to three.DISA Oracle Database 19c STIG v1r3 OracleDBOracleDB

CONFIGURATION MANAGEMENT

O112-C2-005000 - The DBMS must have the capability to limit the number of failed login attempts based upon an organization-defined number of consecutive invalid attempts occurring within an organization-defined time period.DISA STIG Oracle 11.2g v2r5 DatabaseOracleDB

CONFIGURATION MANAGEMENT

O121-C2-005000 - The DBMS must set the maximum number of consecutive invalid logon attempts to three.DISA Oracle Database 12c STIG v3r5 OracleDBOracleDB

CONFIGURATION MANAGEMENT