Item Search

NameAudit NamePluginCategory
3.2 Ensure 'High Availability' requires Link Monitoring and/or Path MonitoringCIS Palo Alto Firewall 10 v1.2.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Failure ConditionCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.10 Ensure global .NET trust level is configuredCIS IIS 8.0 v1.5.1 Level 1Windows

ACCESS CONTROL

3.10 Ensure global .NET trust level is configured - ApplicationsCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

3.10 Ensure global .NET trust level is configured - DefaultCIS IIS 7 L1 v1.8.0Windows

ACCESS CONTROL

20.22 Ensure 'Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority' (STIG DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.22 Ensure 'Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority' (STIG DC only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

20.22 Ensure 'Domain Controller PKI certificates must be issued by the DoD PKI or an approved External Certificate Authority' (STIG DC only)CIS Microsoft Windows Server 2016 STIG v3.0.0 STIG DCWindows

SYSTEM AND COMMUNICATIONS PROTECTION

AADC-CL-000205 - Adobe Acrobat Pro DC Classic Enhanced Security for standalone mode must be enabled.DISA STIG Adobe Acrobat Pro DC Classic Track v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AADC-CL-000210 - Adobe Acrobat Pro DC Classic Enhanced Security for browser mode must be enabled.DISA STIG Adobe Acrobat Pro DC Classic Track v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-003020 - The macOS system must use multifactor authentication for local and network access to privileged and non-privileged accounts - ChallengeResponseAuthenticationDISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-14-003020 - The macOS system must use multifactor authentication for local and network access to privileged and non-privileged accounts - enforceSmartCardDISA STIG Apple Mac OSX 10.14 v2r6Unix

IDENTIFICATION AND AUTHENTICATION

AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - ChallengeResponseAuthenticationDISA STIG Apple Mac OSX 10.14 v2r6Unix

MAINTENANCE

AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - enforceSmartCardDISA STIG Apple Mac OSX 10.14 v2r6Unix

MAINTENANCE

AOSX-14-003024 - The macOS system must use multifactor authentication in the establishment of nonlocal maintenance and diagnostic sessions - PasswordAuthenticationDISA STIG Apple Mac OSX 10.14 v2r6Unix

MAINTENANCE

AOSX-15-003020 - The macOS system must use multifactor authentication for local and network access to privileged and non-privileged accounts, the establishment of nonlocal maintenance and diagnostic sessions, and authentication for remote access to privileged accounts in such a way that one of the factors is provided by a device separate from the system gaining access - ChallengeResponseAuthenticationDISA STIG Apple Mac OSX 10.15 v1r10Unix

IDENTIFICATION AND AUTHENTICATION, MAINTENANCE

ARST-RT-000280 - The Arista router must be configured to authenticate all routing protocol messages using NIST-validated FIPS 198-1 message authentication code algorithm.DISA STIG Arista MLS EOS 4.x Router v2r2Arista

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

EP11-00-002300 - The EDB Postgres Advanced Server must by default shut down upon audit failure, to include the unavailability of space for more audit log records; or must be configurable to shut down upon audit failure.EDB PostgreSQL Advanced Server v11 Windows OS Audit v2r4Windows

AUDIT AND ACCOUNTABILITY

ESXI-70-000064 - All port groups on standard switches must not be configured to virtual local area network (VLAN) 4095 unless Virtual Guest Tagging (VGT) is required.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-80-000220 - The ESXi host must restrict the use of Virtual Guest Tagging (VGT) on standard switches.DISA VMware vSphere 8.0 ESXi STIG v2r3VMware

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 12 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - CharactersAirWatch - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - CharactersAirWatch - DISA Google Android 12 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - Complex CharactersMobileIron - DISA Google Android 12 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - NumbersAirWatch - DISA Google Android 12 COBO v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-12-006100 - Google Android 12 must be configured to not allow passwords that include more than two repeating or sequential characters - NumbersAirWatch - DISA Google Android 12 COPE v1r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - CharactersAirWatch - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - Complex CharactersMobileIron - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - Complex CharactersMobileIron - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - NumbersAirWatch - DISA Google Android 13 COBO v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-13-006100 - Google Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - NumbersAirWatch - DISA Google Android 13 COPE v2r2MDM

CONFIGURATION MANAGEMENT

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 14 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - CharactersAirWatch - DISA Google Android 14 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - Complex CharactersMobileIron - DISA Google Android 14 COPE v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-14-006100 - Google Android 14 must be configured to not allow passwords that include more than four repeating or sequential characters - NumbersAirWatch - DISA Google Android 14 COBO v2r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006100 - Google Android 15 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 15 COBO v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006100 - Google Android 15 must be configured to not allow passwords that include more than four repeating or sequential characters - AlphanumericMobileIron - DISA Google Android 15 COPE v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006100 - Google Android 15 must be configured to not allow passwords that include more than four repeating or sequential characters - CharactersAirWatch - DISA Google Android 15 COBO v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006100 - Google Android 15 must be configured to not allow passwords that include more than four repeating or sequential characters - Complex CharactersMobileIron - DISA Google Android 15 COPE v1r2MDM

IDENTIFICATION AND AUTHENTICATION

GOOG-15-006100 - Google Android 15 must be configured to not allow passwords that include more than four repeating or sequential characters - NumbersAirWatch - DISA Google Android 15 COBO v1r2MDM

IDENTIFICATION AND AUTHENTICATION

HONW-13-006100 - Honeywell Android 13 must be configured to not allow passwords that include more than four repeating or sequential characters - NumbersAirWatch - DISA Honeywell Android 13 COPE v1r1MDM

IDENTIFICATION AND AUTHENTICATION

JUEX-NM-000020 - The Juniper EX switch must be configured to automatically audit account creation.DISA Juniper EX Series Network Device Management v2r3Juniper

ACCESS CONTROL

JUEX-RT-000110 - The Juniper router must be configured to disable the auxiliary port unless it is connected to a secured modem providing encryption and authentication.DISA Juniper EX Series Router v2r1Juniper

ACCESS CONTROL

JUNI-RT-000440 - The Juniper router must be configured to only permit management traffic that ingresses and egresses the OOBM interface - OutboundDISA STIG Juniper Router RTR v3r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000067 - The Photon operating system must configure sshd to use FIPS 140-2 ciphers.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-65-000017 - The vCenter Server for Windows must not override port group settings at the port level on distributed switches.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

CONFIGURATION MANAGEMENT

vNetwork : verify-vlan-idVMWare vSphere 5.X Hardening GuideVMware