Item Search

NameAudit NamePluginCategory
2.7 Set default ulimit as appropriateCIS Docker 1.13.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.7 Set default ulimit as appropriate - default-ulimitCIS Docker 1.12.0 v1.0.0 L1 DockerUnix

SYSTEM AND COMMUNICATIONS PROTECTION

2.8 Ensure the default ulimit is configured appropriatelyCIS Docker v1.7.0 L1 Docker - LinuxUnix

CONFIGURATION MANAGEMENT

4.2.1.4 Ensure rsyslog is configured to send logs to a remote log hostCIS Debian 8 Workstation L1 v2.0.2Unix

AUDIT AND ACCOUNTABILITY

4.2.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Debian Family Workstation L1 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.6.11.1 (L1) Ensure 'Hardened UNC Paths' is set to 'Enabled, with 'Require Mutual Authentication', 'Require Integrity', and 'Require Privacy' set for all NETLOGON and SYSVOL shares'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

IDENTIFICATION AND AUTHENTICATION

5.1.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Oracle Linux 7 v4.0.0 L1 WorkstationUnix

AUDIT AND ACCOUNTABILITY

5.1.1.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Red Hat EL8 Workstation L1 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

5.1.2.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

AUDIT AND ACCOUNTABILITY

5.4 CIFS - 'ldap.security.level = 1 or 2'TNS NetApp Data ONTAP 7GNetApp

SYSTEM AND COMMUNICATIONS PROTECTION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 10 L2 v1.1.0 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 10 L2 v1.1.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 9 L2 v1.2.0Unix

IDENTIFICATION AND AUTHENTICATION

6.1 Setup Client-cert AuthenticationCIS Apache Tomcat 9 L2 v1.2.0 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

6.2.1 Set SSH Protocol to 2CIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

6.2.3.6 Ensure rsyslog is configured to send logs to a remote log hostCIS Rocky Linux 9 v2.0.0 L1 ServerUnix

AUDIT AND ACCOUNTABILITY

9.3.1 Set SSH Protocol to 2CIS Debian Linux 7 L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

9.3.1 Set SSH Protocol to 2CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

ARST-RT-000030 - The Arista BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000200 - The out-of-band management (OOBM) Arista gateway router must be configured to not redistribute routes between the management network routing domain and the managed network routing domain.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

AS24-W1-000010 - The Apache web server must limit the number of allowed simultaneous session requests.DISA STIG Apache Server 2.4 Windows Server v3r3Windows

ACCESS CONTROL

AS24-W1-000010 - The Apache web server must limit the number of allowed simultaneous session requests.DISA STIG Apache Server 2.4 Windows Server v2r3Windows

ACCESS CONTROL

CIS_DC_SERVER_2012_Level_2_v3.0.0.audit from CIS Security Benchmark For Microsoft Windows Server 2012 DC Level 2CIS Windows Server 2012 DC L2 v3.0.0Windows
CIS_Docker_1.6_v1.0.0_L2_Docker.audit Level 2CIS Docker 1.6 v1.0.0 L2 DockerUnix
CIS_MS_SERVER_2012_Level_2_v3.0.0.audit from CIS Security Benchmark For Microsoft Windows Server 2012 MS Level 2CIS Windows Server 2012 MS L2 v3.0.0Windows
Deny log on through Remote Desktop ServicesMSCT Windows 11 v23H2 v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows 10 v21H2 v1.0.0Windows

ACCESS CONTROL

Deny log on through Remote Desktop ServicesMSCT Windows 11 v1.0.0Windows

ACCESS CONTROL

DNS Profile - Address - DNS Server 2Tenable Cisco ACICisco_ACI

SYSTEM AND COMMUNICATIONS PROTECTION

EDGE-00-000008 - The ability of sites to show pop-ups must be disabled.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

Enable IKE Version 1/2 - groupTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

SYSTEM AND COMMUNICATIONS PROTECTION

Enable IKE Version 1/2 - rekeyTenable Cisco Viptela SD-WAN - vEdgeCisco_Viptela

ACCESS CONTROL

Enable QoS on all VM guestsTNS Citrix HypervisorUnix

SYSTEM AND COMMUNICATIONS PROTECTION

GEN002730 - The audit system must alert the SA when the audit storage volume approaches its capacity - audit_warnDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002730 - The audit system must alert the SA when the audit storage volume approaches its capacity - audit_warnDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002730 - The audit system must alert the SA when the audit storage volume approaches its capacity - minfreeDISA STIG Solaris 10 X86 v2r4Unix

AUDIT AND ACCOUNTABILITY

GEN002730 - The audit system must alert the SA when the audit storage volume approaches its capacity - minfreeDISA STIG Solaris 10 SPARC v2r4Unix

AUDIT AND ACCOUNTABILITY

Huawei: Require SSH version 2TNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows 10 v22H2 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows 11 v22H2 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server 2012 R2 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Salesforce.com : Email Services - 'OverLimitAction != 2'TNS Salesforce Best Practices Audit v1.2.0Salesforce.com

CONFIGURATION MANAGEMENT

SonicWALL - Flood Protection - Layer 2 - ThresholdTNS SonicWALL v5.9SonicWALL

SYSTEM AND COMMUNICATIONS PROTECTION

Specifies whether the display-capture permissions-policy is checked or skippedMSCT Edge v98 v1.0.0Windows

CONFIGURATION MANAGEMENT

SPLK-CL-000290 - Splunk Enterprise must be configured to send an immediate alert to the System Administrator (SA) and Information System Security Officer (ISSO) (at a minimum) when allocated log record storage volume reaches 75 percent of the repository maximum log record storage capacity.DISA STIG Splunk Enterprise 7.x for Windows v3r1 REST APISplunk

AUDIT AND ACCOUNTABILITY

SQL6-D0-001900 - SQL Server must isolate security functions from non-security functions.DISA STIG SQL Server 2016 Database Audit v3r2MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-67-000001 - VMware Postgres must limit the number of connections.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

ACCESS CONTROL

XenServer - Enable QoS on all VM guestsTNS Citrix XenServerUnix