2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows Server 2022 v4.0.0 L1 MS | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BL | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MS | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1 | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1 | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 (L1) Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows Server 2025 v1.0.0 L1 DC | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain Controller | Windows | AUDIT AND ACCOUNTABILITY |
2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled' | CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 DC | Windows | AUDIT AND ACCOUNTABILITY |
5.4 Ensure 'SQL Server Audit' is set to capture both 'failed' and 'successful logins' | CIS SQL Server 2022 Database L1 DB v1.1.0 | MS_SQLDB | AUDIT AND ACCOUNTABILITY |
9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' | CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain Controller | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
9.3.5 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MS | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DC | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
9.3.6 Ensure 'Windows Firewall: Public: Settings: Apply local connection security rules' is set to 'No' | CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG MS | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
AIX7-00-002013 - Audit logs on the AIX system must be owned by root. | DISA STIG AIX 7.x v3r1 | Unix | AUDIT AND ACCOUNTABILITY |
AIX7-00-002015 - Audit logs on the AIX system must be set to 660 or less permissive. | DISA STIG AIX 7.x v3r1 | Unix | AUDIT AND ACCOUNTABILITY |
Catalina - Configure the System to Notify upon Account Created Actions | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config DEV_Change exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Fchpriv exists' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FS_Mount exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FS_Umount exists' | DISA STIG AIX 6.1 v1r14 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config PROC_SetUserIDs exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config USER_Create exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events ACCT_Enable exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events DEV_Change exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events FS_Mount exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_Adjtime exists' | DISA STIG AIX 5.3 v1r2 | Unix | CONFIGURATION MANAGEMENT |
Monterey - Audit Record Reduction and Report Generation - processing | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | AUDIT AND ACCOUNTABILITY |
Monterey - Audit Record Reduction and Report Generation - processing | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | AUDIT AND ACCOUNTABILITY |
Monterey - Configure Automated Flaw Remediation | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND INFORMATION INTEGRITY |
Monterey - Configure the System to Notify upon Account Disabled Actions | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Configure the System to Notify upon Account Enabled Actions | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Configure the System to Notify upon Account Enabled Actions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Configure the System to Notify upon Account Modified Actions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Configure the System to Notify upon Account Removed Actions | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Configure the System to Notify upon Account Removed Actions | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL |
Monterey - Configure the System to Notify upon Account Removed Actions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi When Connected to Ethernet | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi When Connected to Ethernet | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi When Connected to Ethernet | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL |
Monterey - Disable Wi-Fi When Connected to Ethernet | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Employ Automated Mechanisms for Account Management Functions | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL |
Monterey - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network Interfaces | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Require a Minimum of Fifty Percent Character Change in New Passwords | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Require Devices to Reauthenticate when Changing Authenticators | NIST macOS Monterey v1.0.0 - 800-53r5 Low | Unix | IDENTIFICATION AND AUTHENTICATION |
Monterey - Secure Name Address Resolution Service | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
MYS8-00-008200 - The MySQL Database Server 8.0 must protect its audit features from unauthorized removal. | DISA Oracle MySQL 8.0 v2r2 DB | MySQLDB | AUDIT AND ACCOUNTABILITY |
UBTU-18-010305 - The Ubuntu operating system must be configured so that audit log files cannot be read or write-accessible by unauthorized users. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | AUDIT AND ACCOUNTABILITY |
UBTU-18-010307 - The Ubuntu operating system must permit only authorized groups to own the audit log files. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | AUDIT AND ACCOUNTABILITY |
WN22-CC-000020 - Windows Server 2022 must have WDigest Authentication disabled. | DISA Microsoft Windows Server 2022 STIG v2r4 | Windows | CONFIGURATION MANAGEMENT |