Item Search

NameAudit NamePluginCategory
19.7.4.2 Ensure 'Notify antivirus programs when opening attachments' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

ARST-RT-000010 - The Arista router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL

ARST-RT-000010 - The Arista router must be configured to enforce approved authorizations for controlling the flow of information within the network based on organization-defined information flow control policies.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000020 - The Arista BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL

ARST-RT-000040 - The Arista BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000050 - The Arista BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL

ARST-RT-000070 - The Arista Multicast Source Discovery Protocol (MSDP) router must be configured to filter received source-active multicast advertisements for any undesirable multicast groups and sources.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL

ARST-RT-000090 - The Arista MSDP router must be configured to limit the amount of source-active messages it accepts on per-peer basis.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000110 - The Arista perimeter router must be configured to enforce approved authorizations for controlling the flow of information between interconnected networks in accordance with applicable policy.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000120 - The Arista multicast router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000130 - The Arista multicast router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000170 - The Arista perimeter router must be configured to not be a Border Gateway Protocol (BGP) peer to an alternate gateway service provider.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000190 - The out-of-band management (OOBM) Arista gateway router must be configured to have separate IGP instances for the managed network and management network.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000210 - The multicast Rendezvous Point (RP) Arista router must be configured to filter Protocol Independent Multicast (PIM) Register and Join messages received from the Designated Router (DR) for any undesirable multicast groups and sources.DISA STIG Arista MLS EOS 4.2x Router v2r1Arista

ACCESS CONTROL

ARST-RT-000210 - The multicast Rendezvous Point (RP) Arista router must be configured to filter Protocol Independent Multicast (PIM) Register and Join messages received from the Designated Router (DR) for any undesirable multicast groups and sources.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL

CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ACL AppliedDISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

CASA-FW-000010 - The Cisco ASA must be configured to filter outbound traffic, allowing only authorized ports and services - ingress ACLDISA STIG Cisco ASA FW v2r1Cisco

ACCESS CONTROL

CASA-VN-000300 - The Cisco ASA VPN gateway must be configured to restrict what traffic is transported via the IPsec tunnel according to flow control policies.DISA STIG Cisco ASA VPN v2r2Cisco

ACCESS CONTROL

DTBI515 - Web sites in less privileged web content zones must be disallowed to navigate into the Internet zone.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

ACCESS CONTROL

DTBI520 - Web sites in less privileged web content zones must be disallowed to navigate into the Restricted Site zone.DISA STIG Microsoft Internet Explorer 9 v1r15Windows

ACCESS CONTROL

EX19-ED-000017 - Exchange must have accepted domains configured.DISA Microsoft Exchange 2019 Edge Server STIG v2r2Windows

ACCESS CONTROL

FNFG-FW-000005 - The FortiGate firewall must use filters that use packet headers and packet attributes, including source and destination IP addresses and ports.DISA Fortigate Firewall STIG v1r3FortiGate

ACCESS CONTROL

GEN000000-AIX0200 - The system must not allow directed broadcasts to gateway.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN000000-AIX0220 - The system must provide protection for the TCP stack against connection resets, SYN, and data injection attacks.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003603 - The system must not respond to ICMPv4 echoes sent to a broadcast address.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003605 - The system must not apply reversed source routing to TCP responses.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003606 - The system must prevent local applications from generating source-routed packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN003607 - The system must not accept source-routed IPv4 packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007820 - The system must not have IP tunnels configured - 'lstun -a'DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007880 - The system must not send IPv6 ICMP redirects.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007920 - The system must not forward IPv6 source-routed packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN007940 - The system must not accept source-routed IPv6 packets.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

JUEX-RT-000020 - The Juniper BGP router must be configured to reject inbound route advertisements for any Bogon prefixes.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000030 - The Juniper BGP router must be configured to reject inbound route advertisements for any prefixes belonging to the local autonomous system (AS).DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000040 - The Juniper BGP router must be configured to reject inbound route advertisements from a customer edge (CE) router for prefixes that are not allocated to that customer.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000050 - The Juniper BGP router must be configured to reject outbound route advertisements for any prefixes that do not belong to any customers or the local autonomous system (AS).DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000090 - The Juniper router configured for MSDP must limit the amount of source-active messages it accepts on per-peer basis.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000110 - The Juniper router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000130 - The Juniper router must be configured to disable Protocol Independent Multicast (PIM) on all interfaces that are not required to support multicast routing.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000140 - The Juniper router must be configured to bind a Protocol Independent Multicast (PIM) neighbor filter to interfaces that have PIM enabled.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUEX-RT-000220 - The Juniper multicast Rendezvous Point (RP) router must be configured to filter Protocol Independent Multicast (PIM) Register messages received from the Designated Router (DR) for any undesirable multicast groups and sources.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL

SHPT-00-000130 - For environments requiring an Internet-facing capability, the SharePoint application server upon which Central Administration is installed must not be installed in the DMZ.DISA STIG SharePoint 2010 v1r9Windows

ACCESS CONTROL

SYMP-AG-000070 - Symantec ProxySG must restrict or block harmful or suspicious communications traffic by controlling the flow of information between interconnected networks based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic - Web AccessDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

SYMP-AG-000080 - Symantec ProxySG must enforce approved authorizations for controlling the flow of information within the network based on attribute- and content-based inspection of the source, destination, headers, and/or content of the communications traffic.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

SYMP-AG-000090 - Symantec ProxySG must immediately use updates made to policy enforcement mechanisms such as policies and rules - Web AccessDISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

ACCESS CONTROL

SYMP-NM-000040 - Symantec ProxySG must be configured to enforce assigned privilege levels for approved administrators when accessing the management console, SSH, and the command line interface (CLI).DISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

ACCESS CONTROL