Item Search

NameAudit NamePluginCategory
2.4.2 Ensure 'Minimum passcode length' is set to '6' or greaterAirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.4.5 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 10 v2.0.0 End User Owned L1MDM

ACCESS CONTROL

2.4.5 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.4.6 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iOS 18 Benchmark v2.0.0 L1 End User OwnedMDM

ACCESS CONTROL

2.4.6 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 18 v2.0.0 L1 End User OwnedMDM

ACCESS CONTROL

2.4.6 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL

2.4.6 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iPadOS 26 v1.0.0 L1 End User OwnedMDM

ACCESS CONTROL

3.4.5 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 11 v1.0.0 Institution Owned L1MDM

ACCESS CONTROL

3.4.5 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

CONFIGURATION MANAGEMENT

3.4.6 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iOS 18 v2.0.0 L1 Institution OwnedMDM

ACCESS CONTROL

3.4.6 Ensure 'Maximum number of failed attempts' is set to '6'MobileIron - CIS Apple iOS 26 v1.0.0 L1 Institution OwnedMDM

ACCESS CONTROL

3.4.6 Ensure 'Maximum number of failed attempts' is set to '6'AirWatch - CIS Apple iPadOS 18 v2.0.0 L1 Institutionally OwnedMDM

ACCESS CONTROL

4.5.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Specify file handler in logging.properties files - check if java.util.logging.ConsoleHandler logging is enabled in defaultCIS Apache Tomcat 9 L1 v1.2.0 MiddlewareUnix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties files - check if java.util.logging.ConsoleHandler logging is enabled in web applicationCIS Apache Tomcat 10 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties files - check if org.apache.juli.FileHandler exists in defaultCIS Apache Tomcat 10 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

7.2 Specify file handler in logging.properties files - check if org.apache.juli.FileHandler logging is enabled in defaultCIS Apache Tomcat 10 L1 v1.1.0Unix

AUDIT AND ACCOUNTABILITY

18.4.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL

18.4.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon (not recommended)' is set to 'Disabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

18.5.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.5.1 (L1) Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon' is set to 'Disabled'CIS Microsoft Windows Server 2019 v4.0.0 L1 DCWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.5.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v5.0.1 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.5.1 Ensure 'MSS: (AutoAdminLogon) Enable Automatic Logon' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v5.0.0 L1 BLWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000201 - The audit system must be configured to audit changes to the /etc/sudoers file.DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000202 - The audit system must be configured to audit the loading and unloading of dynamic kernel modules - rmmodDISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000218 - The rlogind service must not be running - PROCESS_CHECKDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000234 - The SSH daemon must ignore .rhosts files - 'IgnoreRhosts yes'DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000236 - The SSH daemon must not allow host-based authentication.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000274 - The system must prohibit the reuse of passwords within five iterations - password-authDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000285 - The Oracle Linux operating system must implement the Endpoint Security for Linux Threat Prevention tool - mcafeetp packageDISA STIG Oracle Linux 6 v2r7Unix

SYSTEM AND INFORMATION INTEGRITY

OL6-00-000286 - The x86 Ctrl-Alt-Delete key sequence must be disabled - /sbin/shutdownDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000290 - X Windows must not be enabled unless required.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000292 - The DHCP client must be disabled if not needed.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000297 - Temporary accounts must be provisioned with an expiration date.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000298 - Emergency accounts must be provisioned with an expiration date.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000299 - The system must require passwords to contain no more than three consecutive repeating characters - system-authDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000304 - The operating system must employ automated mechanisms to detect the presence of unauthorized software on organizational information systems and notify designated organizational officials in accordance with the organization defined frequency.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000307 - The operating system must ensure unauthorized, security-relevant configuration changes detected are tracked.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000311 - The audit system must provide a warning when allocated audit record storage volume reaches a documented percentage of maximum audit record storage capacity.DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000339 - The FTP daemon must be configured for logging or verbose mode - 'log_ftp_protocol'DISA STIG Oracle Linux 6 v2r7Unix

AUDIT AND ACCOUNTABILITY

OL6-00-000341 - The snmpd service must not use a default password.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000342 - The system default umask for the bash shell must be 077.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000343 - The system default umask for the csh shell must be 077.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000348 - The FTPS/FTP service on the system must be configured with the Department of Defense (DoD) login banner.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000356 - The system must require administrator action to unlock an account locked by excessive failed login attempts - system-authDISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000372 - The operating system, upon successful logon/access, must display to the user the number of unsuccessful logon/access attempts since the last successful logon/access.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000507 - The operating system, upon successful logon, must display to the user the date and time of the last logon or access via ssh.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000515 - The NFS server must not have the all_squash option enabled.DISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION

OL6-00-000523 - The systems local IPv6 firewall must implement a deny-all, allow-by-exception policy for inbound packets.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL6-00-000529 - The sudo command must require authentication - !authenticateDISA STIG Oracle Linux 6 v2r7Unix

IDENTIFICATION AND AUTHENTICATION