Item Search

NameAudit NamePluginCategory
1.3.1 Ensure 'Minimum Password Complexity' is enabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION

1.9.2 Ensure 'local timezone' is properly configuredCIS Cisco Firewall ASA 9 L1 v4.1.0Cisco

CONFIGURATION MANAGEMENT

1.20 (L1) Ensure 'Enables managed extensions to use the Enterprise Hardware Platform API' is set to 'Disabled'CIS Google Chrome L1 v3.0.0Windows

CONFIGURATION MANAGEMENT

2.1.1.1.1 Set the 'hostname'CIS Cisco IOS XE 16.x v2.1.0 L1Cisco

CONFIGURATION MANAGEMENT

2.1.1.1.1 Set the 'hostname'CIS Cisco IOS XE 17.x v2.2.0 L1Cisco

CONFIGURATION MANAGEMENT

2.1.5 Ensure 'Keep deleted mailboxes for the specified number of days' is set to '30'CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

2.1.6 Ensure 'Do not permanently delete items until the database has been backed up' is set to 'True'CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0Windows

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

2.2.7 Ensure 'Receive connector timeout' is set to '5'CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.5 Ensure 'Enable S/MIME for OWA' is set to 'True'CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5 Ensure 'Number of attempts allowed' is set to '10'CIS Microsoft Exchange Server 2019 L1 MDM v1.0.0Windows

ACCESS CONTROL

5.2.3 Ensure Complex Password Must Contain Alphabetic Characters Is ConfiguredCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

IDENTIFICATION AND AUTHENTICATION

5.3 Set 'Prevent ignoring certificate errors' to 'Enabled'CIS IE 9 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.5 Set 'Prevent ignoring certificate errors' to 'Enabled'CIS IE 11 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.1.1 Ensure that 'security defaults' is enabled in Microsoft Entra IDCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.3.1 (L2) Ensure users installing Outlook add-ins is not allowedCIS Microsoft 365 Foundations v5.0.0 L2 E5microsoft_azure

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.3.1 (L2) Ensure users installing Outlook add-ins is not allowedCIS Microsoft 365 Foundations v5.0.0 L2 E3microsoft_azure

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

6.10.3.4 Ensure XNM-SSL SSLv3 Support is Not SetCIS Juniper OS Benchmark v2.1.0 L1Juniper

IDENTIFICATION AND AUTHENTICATION

17.4.3 Ensure 'Audit Directory Service Access' is set to include 'Success and Failure' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

18.10.18.7 (L2) Ensure 'Enable Windows Package Manager command line interfaces' is set to 'Disabled'CIS Microsoft Windows Server 2025 v1.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.10.18.7 (L2) Ensure 'Enable Windows Package Manager command line interfaces' is set to 'Disabled'CIS Microsoft Windows Server 2022 v4.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.10.18.7 (L2) Ensure 'Enable Windows Package Manager command line interfaces' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L2Windows

CONFIGURATION MANAGEMENT

18.10.18.7 (L2) Ensure 'Enable Windows Package Manager command line interfaces' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.35.1 (L1) Ensure 'Disable Internet Explorer 11 as a standalone browser' is set to 'Enabled: Always'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Android Work Profile Device Configuration - Maximum minutes of inactivity until work profile locksTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL

APPL-13-000056 - The macOS system must implement approved Key Exchange Algorithms within the SSH server configuration.DISA STIG Apple macOS 13 v1r5Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

CISC-RT-000400 - The Cisco out-of-band management (OOBM) gateway router must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.DISA Cisco IOS Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-RT-000400 - The Cisco out-of-band management (OOBM) gateway router must be configured to transport management traffic to the Network Operations Center (NOC) via dedicated circuit, MPLS/VPN service, or IPsec tunnel.DISA Cisco IOS XE Router RTR STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - BasicAuthEnabledDISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - ExternalAuthenticationMethodsDISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - InternalAuthenticationMethodsDISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX13-CA-000035 - Exchange ActiveSync (EAS) must only use certificate-based authentication to access email - WebSiteSSLEnabledDISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

ACCESS CONTROL

EX13-CA-000055 - Exchange must have Queue monitoring configured with threshold and action.DISA Microsoft Exchange 2013 Client Access Server STIG v2r2Windows

AUDIT AND ACCOUNTABILITY

EX13-MB-000210 - The Exchange Send connector connections count must be limited.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000225 - The Exchange Outbound Connection Limit per Domain Count must be controlled.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000230 - The Exchange Outbound Connection Timeout must be 10 minutes or less.DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN007020 - The Stream Control Transmission Protocol (SCTP) must be disabled unless required.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN007020 - The Stream Control Transmission Protocol (SCTP) must be disabled unless required.DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

HONW-09-009800 - Honeywell Mobility Edge Android Pie devices work profile must be configured to disable automatic completion of workspace internet browser text input.AirWatch - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT

HTTP vs. HTTPS - idle-timeoutArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

ACCESS CONTROL

MADB-10-003700 - If MariaDB authentication, using passwords, is employed, then MariaDB must enforce the DOD standards for password complexity.DISA MariaDB Enterprise 10.x v2r3 DBMySQLDB

IDENTIFICATION AND AUTHENTICATION

MSFT-11-005400 - Microsoft Android 11 must allow the Administrator (EMM) to perform the following management function: Wipe Enterprise data.AirWatch - DISA Microsoft Android 11 COPE v1r2MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

MSFT-11-005400 - Microsoft Android 11 must allow the Administrator (EMM) to perform the following management function: Wipe Enterprise data.MobileIron - DISA Microsoft Android 11 COPE v1r2MDM

ACCESS CONTROL, CONFIGURATION MANAGEMENT

OH12-1X-000320 - OHS must have the LoadModule ossl_module directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000321 - OHS must have the SSLFIPS directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000322 - OHS must have the SSLEngine, SSLProtocol, and SSLWallet directives enabled and configured to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version - SSLProtocolDISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000323 - OHS must have the SSLCipherSuite directive enabled to maintain the confidentiality of controlled information during transmission through the use of an approved TLS version.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCLD-67-000025 - VAMI must protect the keystore from unauthorized access.DISA STIG VMware vSphere 6.7 VAMI-lighttpd v1r3Unix

IDENTIFICATION AND AUTHENTICATION

VCRP-70-000006 - Envoy must exclusively use the HTTPS protocol for client connections.DISA STIG VMware vSphere 7.0 RhttpProxy v1r1Unix

ACCESS CONTROL