Item Search

NameAudit NamePluginCategory
1.1.21 Disable AutomountingCIS Debian 8 Workstation L2 v2.0.2Unix

MEDIA PROTECTION, SYSTEM AND INFORMATION INTEGRITY

1.1.22 Disable AutomountingCIS Oracle Linux 6 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.1.22 Disable AutomountingCIS Red Hat 6 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.1.22 Disable AutomountingCIS SUSE Linux Enterprise Server 11 L1 v2.1.1Unix

MEDIA PROTECTION

1.1.22 Disable AutomountingCIS CentOS 6 Workstation L2 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.1.22 Disable AutomountingCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.1.22 Disable AutomountingCIS SUSE Linux Enterprise Workstation 11 L2 v2.1.1Unix

MEDIA PROTECTION

1.2.6.3 Ensure passcode have at least 1 number is set to enabledCIS Zoom L1 v1.0.0Zoom

CONFIGURATION MANAGEMENT

1.7.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS Ubuntu Linux 20.04 LTS v3.0.0 L2 WorkstationUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.7.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.7.7 Ensure GDM disabling automatic mounting of removable media is not overriddenCIS Ubuntu Linux 22.04 LTS v3.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.13.3.1.6 Ensure 'Remove file extensions blocked as Level 2' is set to DisabledCIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.13.3.1.6 Ensure 'Remove file extensions blocked as Level 2' is set to DisabledCIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.246 WN10-UR-000070CIS Microsoft Windows 10 STIG v1.0.0 CAT IIWindows

ACCESS CONTROL

4.6 Ensure That IP Forwarding Is Not Enabled on InstancesCIS Google Cloud Platform Foundation v4.0.0 L1GCP

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

4.11.8.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

4.19 listener.ora - 'inbound_connect_timeout_listener = 2'CIS v1.1.0 Oracle 11g OS L2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

6.2.7 Ensure no duplicate UIDs existCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

6.2.9 Ensure root is the only UID 0 accountCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

8.1.12 Ensure That 'All users with the following roles' is set to 'Owner'CIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

INCIDENT RESPONSE

8.1.13 Ensure 'Additional email addresses' is Configured with a Security Contact EmailCIS Microsoft Azure Foundations v5.0.0 L1microsoft_azure

INCIDENT RESPONSE

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

18.10.15.3 (L1) Ensure 'Prevent the use of security questions for local accounts' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

CIS_Amazon_Linux_2_STIG_v2.0.0_L1_Workstation.audit from CIS Amazon Linux 2 STIG v2.0.0CIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix
CIS_Debian_Linux_8_Workstation_v2.0.2_L2.audit Level 2CIS Debian 8 Workstation L2 v2.0.2Unix
CIS_Distribution_Independent_Linux_Server_L1_v2.0.0.audit Level 2CIS Distribution Independent Linux Server L1 v2.0.0Unix
CIS_Distribution_Independent_Linux_Server_L1_v2.0.0.audit Level 2CIS Distribution Independent Linux Workstation L1 v2.0.0Unix
CIS_Docker_1.13.0_L2_v1.0.0.audit Level 2CIS Docker 1.13.0 v1.0.0 L2 DockerUnix
CIS_Red_Hat_EL6_Workstation_L2_v3.0.0.audit Level 2CIS Red Hat 6 Workstation L2 v3.0.0Unix
CIS_Solaris_11_L2_v1.1.0.audit Level 2CIS Solaris 11 L2 v1.1.0Unix
CIS_Solaris_11.2_L2_v1.1.0.audit Level 2CIS Solaris 11.2 L2 v1.1.0Unix
CIS_Ubuntu_14.04_LTS_Workstation_v2.1.0_L2.audit Level 2CIS Ubuntu Linux 14.04 LTS Workstation L2 v2.1.0Unix
DTOO241 - Action to demote an EMail Level 1 attachment to Level 2 must be configured.DISA STIG Microsoft Outlook 2013 v1r14Windows

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI5-VM-000014 - The unexposed feature keyword isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

ACCESS CONTROL

ESXI5-VM-000015 - The unexposed feature keyword isolation.bios.bbs.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000017 - The unexposed feature keyword isolation.tools.ghi.launchmenu.change must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000019 - The unexposed feature keyword isolation.tools.ghi.protocolhandler.info.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000021 - The unexposed feature keyword isolation.tools.dispTopoRequest.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000022 - The unexposed feature keyword isolation.tools.trashFolderState.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000023 - The unexposed feature keyword isolation.tools.ghi.trayicon.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

ESXI5-VM-000024 - The unexposed feature keyword isolation.tools.unity.disable must be initialized to decrease the VMs potential attack vectors.DISA VMware ESXi Version 5 Virtual Machine STIG v2r1VMware

CONFIGURATION MANAGEMENT

GEN000290-2 - The system must not have the unnecessary news account - news account.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN000520 - The root user must not own the logon session for an application requiring a continuous display.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL

GEN005507 - The SSH daemon must be configured to only use Message Authentication Codes (MACs) employing FIPS 140-2 approved cryptographic hash algorithms - MACs that employ FIPS 140-2 cryptographic hash algorithms.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

O365-OU-000018 - Level 2 file attachments must be blocked from being delivered.DISA Microsoft Office 365 ProPlus STIG v3r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010163 - The krb5-server package must not be installed on RHEL 8.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

IDENTIFICATION AND AUTHENTICATION

VM : disable-unexposed-features-unity-windowcontentsVMWare vSphere 5.X Hardening GuideVMware

CONFIGURATION MANAGEMENT