Item Search

NameAudit NamePluginCategory
1.1.2 - MobileIron - Enable Passcode Lock - 'Passcode Required = on'MobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

1.1.16 - MobileIron - Disable 'developer options' - 'USB Debug'MobileIron - CIS Google Android 4 v1.0.0 L1MDM

ACCESS CONTROL

1.1.17 - MobileIron - Disable 'Unknown sources' - Samsung SAFEMobileIron - CIS Google Android 4 v1.0.0 L1MDM

ACCESS CONTROL

1.2 Ensure 'Screen Lock' is set to EnabledMobileIron - CIS Google Android 7 v1.0.0 L1MDM

ACCESS CONTROL

2.1.1 - MobileIron - Enable 'Require password'MobileIron - CIS Google Android 4 v1.0.0 L1MDM

ACCESS CONTROL

2.2.1 - MobileIron - Require passcode on deviceMobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

2.2.1 - MobileIron - Require passcode on deviceMobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

2.6 Ensure Password Complexity is Configured - validate_password_special_char_countCIS MySQL 5.6 Enterprise Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_check_user_nameCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

2.7 Ensure Password Complexity is Configured - validate_password_lengthCIS MySQL 5.7 Community Database L1 v2.0.0MySQLDB

IDENTIFICATION AND AUTHENTICATION

3.1.1 - MobileIron - Enable 'Require password'MobileIron - CIS Apple iOS 9 v1.0.0 L1MDM

ACCESS CONTROL

3.1.1 - MobileIron - Enable 'Require password'MobileIron - CIS Apple iOS 8 v1.0.0 L1MDM

ACCESS CONTROL

3.1.8 Ensure the maximum log file lifetime is set correctlyCIS PostgreSQL 13 DB v1.2.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

3.1.8 Ensure the maximum log file lifetime is set correctlyCIS PostgreSQL 9.6 DB v1.0.0PostgreSQLDB

AUDIT AND ACCOUNTABILITY

AIOS-15-009900 - Apple iOS/iPadOS 15 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.MobileIron - DISA Apple iOS/iPadOS 14 v1r4MDM

CONFIGURATION MANAGEMENT, MEDIA PROTECTION

AIOS-16-009900 - Apple iOS/iPadOS 16 must be configured to [selection: wipe protected data, wipe sensitive data] upon unenrollment from MDM.MobileIron - DISA Apple iOS/iPadOS 16 v2r1MDM

CONFIGURATION MANAGEMENT, MEDIA PROTECTION

AIOS-17-010000 - Apple iOS/iPadOS 17 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM - any nonfactory installed application] upon unenrollment from MDM.MobileIron - DISA Apple iOS/iPadOS 17 v2r1MDM

CONFIGURATION MANAGEMENT, MEDIA PROTECTION

AIOS-18-010000 - Apple iOS/iPadOS 18 must be configured to [selection: remove Enterprise applications, remove all noncore applications (any nonfactory-installed application)] upon unenrollment from MDM - any nonfactory installed application] upon unenrollment from MDM.MobileIron - DISA Apple iOS/iPadOS 18 v1r1MDM

MEDIA PROTECTION

Ensure 'aaa local authentication max failed attempts' is set to less than or equal to '3'Tenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL

Ensure 'console session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL

Ensure 'EIGRP authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'Failover' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'HTTP session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure 'ip verify' is set to 'reverse-path' for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'logging' is enabledTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'noproxyarp' is enabled for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'Password Policy' is enabled - minimum-lengthTenable Cisco Firepower Best Practices AuditCisco

IDENTIFICATION AND AUTHENTICATION

Ensure 'SNMP traps' is enabled - authenticationTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - coldstartTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkdownTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkupTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'snmp-server group' is set to 'v3 priv'Tenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'snmp-server host' is set to 'version 3'Tenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SSH source restriction' is set to an authorized IP addressTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'syslog hosts' is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'TLS 1.0' is set for HTTPS accessTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure DHCP services are disabled for untrusted interfaces - dhcpdTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure DHCP services are disabled for untrusted interfaces - dhcprelayTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - name-serverTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure email logging is configured for critical to emergencyTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure ICMP is restricted for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure known default accounts do not existTenable Cisco Firepower Best Practices AuditCisco

IDENTIFICATION AND AUTHENTICATION

Ensure non-default application inspection is configured correctlyTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure packet fragments are restricted for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure timezone is properly configuredTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

HONW-09-006100 - The Honeywell Mobility Edge Android Pie device must be configured to generate audit records for the following auditable events: detected integrity violations.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

AUDIT AND ACCOUNTABILITY

HONW-09-007150 - The Honeywell Android Pie must wipe all data upon unenrollment from MDM.MobileIron - DISA Honeywell Android 9.x COBO v1r2MDM

CONFIGURATION MANAGEMENT, MEDIA PROTECTION

TCAT-AS-001470 - Tomcat server must be patched for security vulnerabilities.DISA STIG Apache Tomcat Application Server 9 v3r2 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

ZEBR-10-005505 - Zebra Android 10 must be configured to enable audit logging.MobileIron - DISA Zebra Android 10 COPE v1r2MDM

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT