Item Search

NameAudit NamePluginCategory
1.1 Remove extraneous files and directories (CONFIG_DIR/Catalina/localhost/host-manager.xml)CIS Apache Tomcat 7 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

1.1 Remove extraneous files and directories (CONFIG_DIR/Catalina/localhost/host-manager.xml)CIS Apache Tomcat 7 L2 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.1 Remove extraneous files and directories (CONFIG_DIR/Catalina/localhost/manager.xml)CIS Apache Tomcat 7 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

1.1 Remove extraneous files and directories (CONFIG_DIR/Catalina/localhost/manager.xml)CIS Apache Tomcat 7 L2 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

1.1 Remove extraneous files and directories (WEBAPP_DIR/js-examples)CIS Apache Tomcat 7 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

1.1 Remove extraneous files and directories (WEBAPP_DIR/tomcat-docs)CIS Apache Tomcat 7 L2 v1.1.0 MiddlewareUnix

CONFIGURATION MANAGEMENT

2.1.12 (L1) Ensure the connection filter IP allow list is not usedCIS Microsoft 365 Foundations v5.0.0 L1 E3microsoft_azure

SYSTEM AND INFORMATION INTEGRITY

2.2.1.5 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 12 v1.0.0 End User Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.17.4 Ensure 'User Account Control: Detect application installations and prompt for elevation' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL

3.2.1.10 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 11 v1.0.0 Institution Owned L2MDM

SYSTEM AND COMMUNICATIONS PROTECTION

3.2.1.12 Ensure 'Allow users to accept untrusted TLS certificates' is set to 'Disabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L2MDM

CONFIGURATION MANAGEMENT

4.3 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iOS 12 v1.0.0 Institution Owned L1MDM
4.3 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 v1.0.0 End User Owned L1MDM

SYSTEM AND INFORMATION INTEGRITY

4.3 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iOS 13 and iPadOS 13 Institution Owned L1MDM

SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iPadOS 17 Institutionally Owned L1MDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iPadOS 18 v1.0.0 L1 Institutionally OwnedMDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iOS 17 Institution Owned L1MDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7 Ensure 'Automatic Downloads' of 'App Updates' is set to 'Enabled'AirWatch - CIS Apple iOS 18 Benchmark v1.0.0 L1 End User OwnedMDM

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

4.7.2 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Intune for Windows 10 v4.0.0 L1Windows

ACCESS CONTROL

4.7.10 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Intune for Windows 11 v4.0.0 L1Windows

ACCESS CONTROL

9.1.10 Ensure that Microsoft Defender for Cloud is configured to check VM operating systems for updatesCIS Microsoft Azure Foundations v4.0.0 L1microsoft_azure

RISK ASSESSMENT, SYSTEM AND INFORMATION INTEGRITY

18.7.4 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

CONFIGURATION MANAGEMENT

18.7.5 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.7.9 Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.7.11 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows Server 2025 v1.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.7.11 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

SYSTEM AND INFORMATION INTEGRITY

18.7.11 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.7.11 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL

18.7.11 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

ACCESS CONTROL

18.7.11 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 NGWindows

ACCESS CONTROL

18.7.11 (L1) Ensure 'Point and Print Restrictions: When installing drivers for a new connection' is set to 'Enabled: Show warning and elevation prompt'CIS Microsoft Windows Server 2022 v4.0.0 L1 MSWindows

ACCESS CONTROL

DTOO123 - Navigation to URLs embedded in Office products must be blocked in PowerPoint.DISA STIG Microsoft PowerPoint 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft Project 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft Outlook 2016 v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft Word 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - Navigation to URLs embedded in Office products must be blocked.DISA STIG Microsoft Groove 2013 v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO123 - OneNote - Navigation to URL's embedded in Office products must be blocked.DISA STIG Office 2010 OneNote v1r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of IE from within an Office product must be blocked.DISA STIG Microsoft Visio 2013 v1r5Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of Internet Explorer from within an Office product must be blockedDISA STIG Microsoft Publisher 2016 v1r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of Internet Explorer from within an Office product must be blocked.DISA STIG Microsoft Excel 2016 v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of Internet Explorer from within an Office product must be blocked.DISA STIG Microsoft Outlook 2016 v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO129 - Links that invoke instances of Internet Explorer from within an Office product must be blocked.DISA STIG Microsoft Word 2016 v1r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EDGE-00-000041 - Extensions installation must be blocklisted by default.DISA STIG Edge v2r2Windows

CONFIGURATION MANAGEMENT

IBM i : Secure Sockets Layer (SSL) cipher specification list (QSSLCSL)IBM System i Security Reference for V7R3AS/400

SYSTEM AND COMMUNICATIONS PROTECTION

KNOX-07-914100 - The Samsung Android 7 with Knox must implement the management setting: Configure Container application disable list.MobileIron - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

Monterey - Enforce Installation of XProtect, MRT, and Gatekeeper Updates AutomaticallyNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

RHEL-07-010492 - Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

SPLK-CL-000100 - Splunk Enterprise installation directories must be secured.DISA STIG Splunk Enterprise 7.x for Windows v3r1 OSWindows

AUDIT AND ACCOUNTABILITY

VBA Macro Notification Settings - vbawarnings - accessMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION