Item Search

NameAudit NamePluginCategory
1.13.3.4 Ensure 'Outlook Security Mode' is set to EnabledCIS Microsoft Office Outlook 2016 v1.1.0 Level 1Windows

CONFIGURATION MANAGEMENT

1.13.3.4 Ensure 'Outlook Security Mode' is set to EnabledCIS Microsoft Office Outlook 2013 v1.1.0 Level 1Windows

CONFIGURATION MANAGEMENT

2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

AUDIT AND ACCOUNTABILITY

2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

AUDIT AND ACCOUNTABILITY

2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

AUDIT AND ACCOUNTABILITY

3.092 - The system must generate an audit event when the audit log reaches a percentage of full threshold.DISA Windows Vista STIG v6r41Windows

AUDIT AND ACCOUNTABILITY

5.1.17 Set 'Outlook Security Policy:' to 'Enabled:Use Outlook Security Group Policy'CIS MS Office Outlook 2010 v1.0.0Windows

CONFIGURATION MANAGEMENT

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS CentOS Linux 7 v4.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Amazon Linux 2 v3.0.0 L2Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS AlmaLinux OS 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Red Hat EL8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Rocky Linux 8 Workstation L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Oracle Linux 8 Server L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.1 Ensure the audit log directory is 0750 or more restrictiveCIS Oracle Linux 8 Workstation L2 v3.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Ubuntu Linux 18.04 LTS v2.2.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Debian 10 Server L2 v2.0.0Unix

ACCESS CONTROL, MEDIA PROTECTION

5.2.4.4 Ensure the audit log directory is 0750 or more restrictiveCIS Ubuntu Linux 20.04 LTS Server L2 v2.0.1Unix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Ubuntu Linux 24.04 LTS v1.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 12 v1.1.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.2.18 Ensure AUDIT_ADMIN' Is Revoked From Unauthorized 'GRANTEE'CIS Oracle Database 23ai v1.0.0 L1 RDBMSOracleDB

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.1 Ensure the audit log file directory mode is configuredCIS Rocky Linux 9 v2.0.0 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.1 Ensure the audit log file directory mode is configuredCIS Oracle Linux 9 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.1 Ensure the audit log file directory mode is configuredCIS SUSE Linux Enterprise 15 v2.0.1 L2 ServerUnix

ACCESS CONTROL, MEDIA PROTECTION

6.3.4.1 Ensure the audit log file directory mode is configuredCIS SUSE Linux Enterprise 15 v2.0.1 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.4.4.4 Ensure the audit log file directory mode is configuredCIS Debian Linux 11 v2.0.0 L2 WorkstationUnix

ACCESS CONTROL, MEDIA PROTECTION

6.6 (L1) Ensure 'Account Management Audit Application Group Management' is set to 'Success and Failure'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.6 (L1) Ensure 'Account Management Audit Application Group Management' is set to 'Success and Failure'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.19 (L1) Ensure 'Object Access Audit Other Object Access Events' is set to 'Success and Failure'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.19 (L1) Ensure 'Object Access Audit Other Object Access Events' is set to 'Success and Failure'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.21 (L1) Ensure 'Policy Change Audit MPSSVC Rule Level Policy Change' is set to 'Success and Failure'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.21 (L1) Ensure 'Policy Change Audit MPSSVC Rule Level Policy Change' is set to 'Success and Failure'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.23 (L1) Ensure 'Privilege Use Audit Sensitive Privilege Use' is set to 'Success and Failure'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

6.23 (L1) Ensure 'Privilege Use Audit Sensitive Privilege Use' is set to 'Success and Failure'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

AUDIT AND ACCOUNTABILITY

AIOS-16-708400 - The Apple iOS/iPadOS 16 device User Agreement must include the DOD advisory warning message.AirWatch - DISA Apple iOS/iPadOS 16 BYOAD v1r1MDM

ACCESS CONTROL

AIOS-98-080208 - Before establishing a user session, display an administrator-specified advisory notice and consent warning banner.AirWatch - DISA Apple iOS 10 v1r3MDM

CONFIGURATION MANAGEMENT

O365-OU-000014 - The Outlook Security Mode must be enabled to always use the Outlook Security Group Policy.DISA STIG Microsoft Office 365 ProPlus v3r3Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMSCT M365 Apps for enterprise 2312 v1.0.0Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMSCT Office 365 ProPlus 1908 v1.0.0Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMSCT M365 Apps for enterprise 2412 v1.0.0Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMSCT Office 2016 v1.0.0Windows

CONFIGURATION MANAGEMENT

Outlook Security ModeMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

CONFIGURATION MANAGEMENT

PHTN-30-000051 - The Photon operating system package files must not be modified.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

AUDIT AND ACCOUNTABILITY

PHTN-67-000053 - The Photon operating system package files must not be modified.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

AUDIT AND ACCOUNTABILITY

SPLK-CL-000360 - Splunk Enterprise must enforce a minimum 15-character password length for the account of last resort.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

IDENTIFICATION AND AUTHENTICATION

UBTU-16-020090 - Audit logs must have a mode of 0600 or less permissive to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

UBTU-16-020120 - Audit logs must be group-owned by root to prevent unauthorized read access.DISA STIG Ubuntu 16.04 LTS v2r3Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

WN16-CC-000030 - WDigest Authentication must be disabled on Windows Server 2016.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-CC-000020 - Windows Server 2019 must have WDigest Authentication disabled.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT