1.4.6 Ensure version 7.2 or newer booted with UEFI have a unique name for the grub superusers account - UEFI must have a unique name for the grub superusers account when booting into single-user mode and maintenance. | CIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIG | Unix | ACCESS CONTROL |
ESXi : config-firewall-access - 'CIM Secure Server allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'DHCP Client allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'DVFilter blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'gdbserver blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'httpClient blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'IKED blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'NFS Client blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'syslog blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'vSphere Web Access allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-ntp | VMWare vSphere 5.X Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : disable-esxi-shell | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
ESXi : disable-ssh | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
ESXi : remove-authorized-keys | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : set-dcui-access | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : set-shell-timeout | VMWare vSphere 5.X Hardening Guide | VMware | ACCESS CONTROL |
ESXi : verify-acceptance-level-supported | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : verify-kernel-modules | VMWare vSphere 5.X Hardening Guide | VMware | |
GEN005260 - X Window System connections not required must be disabled. | DISA STIG AIX 6.1 v1r14 | Unix | ACCESS CONTROL |
GEN005260 - X Window System connections not required must be disabled. | DISA STIG AIX 5.3 v1r2 | Unix | ACCESS CONTROL |
GEN005260 - X Window System connections that are not required must be disabled. | DISA STIG Solaris 10 X86 v2r4 | Unix | CONFIGURATION MANAGEMENT |
OL08-00-010140 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. | DISA Oracle Linux 8 STIG v2r4 | Unix | ACCESS CONTROL |
SOL-11.1-020560 - X Window System connections that are not required must be disabled. | DISA STIG Solaris 11 X86 v3r1 | Unix | CONFIGURATION MANAGEMENT |
SSO : no-SSO-self-signed-certs | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : install-with-service-account | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : monitor-admin-assignment | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : remove-revoked-certificates | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : restrict-admin-privilege | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : restrict-network-access | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : restrict-vcs-db-user | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : secure-vcenter-os | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : use-supported-system | VMWare vSphere 5.X Hardening Guide | VMware | |
VM : minimize-console-use | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : document-pvlans | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : document-vlans-vds | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : enable-portfast | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : isolate-storage-network-vlan | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : isolate-vmotion-network-vlan | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : limit-administrator-scope | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : limit-network-healthcheck | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : no-native-vlan-1 | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : no-vgt-vlan-4095 | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
vNetwork : reject-mac-change-dvportgroup | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : reject-mac-changes - 'PortGroup' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
vNetwork : reject-mac-changes - 'vSwitch' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
vNetwork : restrict-mgmt-network-access-gateway | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : set-non-negotiate | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : verify-vlan-trunk | VMWare vSphere 5.X Hardening Guide | VMware | |
VUM : isolate-vum-airgap | VMWare vSphere 5.X Hardening Guide | VMware | |
VUM : limit-vum-users | VMWare vSphere 5.X Hardening Guide | VMware | |