Item Search

NameAudit NamePluginCategory
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPSCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSHCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.3 Ensure HTTP and Telnet options are disabled for the management interfaceCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - HTTPCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.4 Ensure HTTP and Telnet options are disabled for all management profiles - TelnetCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interface - Authentication ProfileCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interface - Certificate ProfilesCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.2.5 Ensure valid certificate is set for browser-based administrator interface - CertificatesCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.3.1 Pre-authentication BannerCIS Cisco NX-OS L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.3.2 Post-authentication BannerCIS Cisco NX-OS L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.4.5.1 Ensure 'aaa accounting command' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

1.4.5.2 Ensure 'aaa accounting for SSH' is configured correctlyCIS Cisco ASA 9.x Firewall L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.7.1 Pre-authentication BannerCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.7.2 Post-authentication BannerCIS Cisco IOS XR 7.x v1.0.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.8.2 Disable iPXE (Pre-boot eXecution Environment)CIS Cisco NX-OS L2 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.1 Configure Control Plane PolicingCIS Cisco NX-OS L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.2 Ensure that WMI probing is disabledCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.3 Ensure that User-ID is only enabled for internal trusted interfacesCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1.4.4 Configure HSRP protectionsCIS Cisco NX-OS L1 v1.1.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3.1.7 Set 'authentication mode md5'CIS Cisco IOS XE 17.x v2.1.1 L2Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.1.1 Apply a Trusted Signed Certificate for VPN PortalCIS Fortigate 7.0.x v1.3.0 L2FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set to appropriate actionsCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packetsCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 9 v1.1.0 L2Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

8.3 Ensure that the Certificate used for Decryption is TrustedCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.2 Ensure the LimitRequestFields Directive is Set to 100 or LessCIS Apache HTTP Server 2.4 v2.2.0 L2Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

AOSX-13-000070 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-000008 - The macOS system must be configured with Wi-Fi support software disabled.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

APPL-14-005058 The macOS system must disable Handoff.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

APPL-15-002271 - The macOS system must disable iPhone Mirroring.DISA Apple macOS 15 (Sequoia) STIG v1r3Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r5 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r4 LowUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

GEN007841 - Wireless network adapters must be disabled.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN007841 - Wireless network adapters must be disabled.DISA STIG Solaris 10 SPARC v2r4Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN007841 - Wireless network adapters must be disabled.DISA STIG Solaris 10 X86 v2r4Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

GEN007841-ESXI5-000120 - Wireless network adapters must be disabled.DISA STIG VMWare ESXi Server 5 STIG v2r1VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000293 - Wireless network adapters must be disabled.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-07-041010 - The Red Hat Enterprise Linux operating system must be configured so that all wireless network adapters are disabled.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-291040 - RHEL 9 wireless network adapters must be disabled.DISA Red Hat Enterprise Linux 9 STIG v2r4Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-12-030450 - The SUSE operating system wireless network adapters must be disabled unless approved and documented.DISA SLES 12 STIG v3r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-050480 - Wireless network adapters must be disabled.DISA STIG Solaris 11 SPARC v3r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-050480 - Wireless network adapters must be disabled.DISA STIG Solaris 11 X86 v3r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-16-030500 - Wireless network adapters must be disabled.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION