Item Search

NameAudit NamePluginCategory
1.3.5 Ensure 'Maximum tolerance for computer clock synchronization' is set to '5 or fewer minutes' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

2.3.17.7 Ensure 'User Account Control: Switch to the secure desktop when prompting for elevation' is set to 'Enabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

5.3.1.1 Ensure latest version of pam is installedCIS Ubuntu Linux 20.04 LTS v3.0.0 L1 WorkstationUnix

IDENTIFICATION AND AUTHENTICATION

5.5.6 Ensure user and group account administration utilities are configured to store only encrypted representations of passwordsCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

IDENTIFICATION AND AUTHENTICATION

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.24 Benchmark v1.0.0 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

5.7.1 Create administrative boundaries between resources using namespacesCIS Kubernetes v1.23 Benchmark v1.0.1 L1 MasterUnix

SYSTEM AND COMMUNICATIONS PROTECTION

18.10.91.2 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.10.91.2 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.91.2 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

CONFIGURATION MANAGEMENT

18.10.91.2 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

18.10.91.2 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

CONFIGURATION MANAGEMENT

18.10.91.2 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 NGWindows

CONFIGURATION MANAGEMENT

18.10.91.3 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

CONFIGURATION MANAGEMENT

18.10.91.3 (L1) Ensure 'Allow networking in Windows Sandbox' is set to 'Disabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

CONFIGURATION MANAGEMENT

20.3 Ensure 'Active Directory Domain Controllers Organizational Unit (OU) object have the proper access control permissions' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

AUDIT AND ACCOUNTABILITY

20.17 Ensure 'Deny-all, permit-by-exception policy to allow the execution of authorized software programs' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

20.18 Ensure 'Directory data (outside the root DSE) of a non-public directory is configured' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

CONFIGURATION MANAGEMENT

20.25 Ensure 'Domain-joined systems have a Trusted Platform Module (TPM) enabled and ready for use' (STIG only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

CONFIGURATION MANAGEMENT

101.2 (L1) Ensure 'Allow Networking' is set to 'Not allowed'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

CONFIGURATION MANAGEMENT

ESXI5-VMNET-000046 - All IP-based storage traffic must be isolated using a vSwitch containing management-only port groups.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

F5BI-DM-000281 - The BIG-IP appliance must be configured to employ automated mechanisms to assist in the tracking of security incidents.DISA F5 BIG-IP Device Management STIG v2r4F5

CONFIGURATION MANAGEMENT, INCIDENT RESPONSE

Failed authentication lockout - lockout-delayArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

ACCESS CONTROL

Failed authentication lockout - num-attemptsArubaOS Switch 16.x Hardening Guide v1.0.0ArubaOS

ACCESS CONTROL

GEN005570-ESXI5-000115 - The system must be configured with a default gateway for IPv6 if the system uses IPv6, unless the system is a router.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

CONFIGURATION MANAGEMENT

JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - BGPDISA STIG Juniper Router RTR v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - IS-ISDISA STIG Juniper Router RTR v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

JUNI-RT-000050 - The Juniper router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 140-2 message authentication code algorithm - OSPFDISA STIG Juniper Router RTR v3r2Juniper

IDENTIFICATION AND AUTHENTICATION

RHEL-08-010171 - RHEL 8 must have policycoreutils package installed.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL2-00-015200 - SQL Server must be monitored to discover unauthorized changes to stored procedures.DISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-014900 - SQL Server must be monitored to discover unauthorized changes to functions.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-015100 - SQL Server must be monitored to discover unauthorized changes to triggers.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

SQL4-00-015200 - SQL Server must be monitored to discover unauthorized changes to stored procedures.DISA STIG SQL Server 2014 Database Audit v1r7MS_SQLDB

CONFIGURATION MANAGEMENT

TCAT-AS-000700 - DOD root CA certificates must be installed in Tomcat trust store.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

VCPF-67-000027 - Rsyslog must be configured to monitor and ship Performance Charts log files - localhost_accessDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

VCPF-67-000027 - Rsyslog must be configured to monitor and ship Performance Charts log files - runtimeDISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

AUDIT AND ACCOUNTABILITY

VCSA-70-000267 - The vCenter Server must disable the distributed virtual switch health check.DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000267 - The vCenter Server must disable the distributed virtual switch health check.DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000268 - The vCenter Server must set the distributed port group Forged Transmits policy to "Reject".DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCSA-80-000269 - The vCenter Server must set the distributed port group Media Access Control (MAC) Address Change policy to "Reject".DISA VMware vSphere 8.0 vCenter STIG v2r2VMware

CONFIGURATION MANAGEMENT

VCTR-67-000013 - The vCenter Server must set the distributed port group Forged Transmits policy to reject.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000014 - The vCenter Server for Windows must set the distributed port group MAC Address Change policy to reject.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

VCWN-65-000019 - The vCenter Server for Windows must configure all port groups to VLAN 4095 unless Virtual Guest Tagging (VGT) is required.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

WN10-00-000165 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN12-00-000170 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-00-000170 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN16-00-000411 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB server.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-00-000390 - Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN22-00-000390 - Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB server.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT