Item Search

NameAudit NamePluginCategory
1.2 Set 'Maximum receive size - organization level' to '10240'CIS Microsoft Exchange Server 2016 Hub v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

AUDIT AND ACCOUNTABILITY

2.3.2.2 Ensure 'Audit: Shut down system immediately if unable to log security audits' is set to 'Disabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

AUDIT AND ACCOUNTABILITY

2.5.14.3.4 Ensure 'Outlook Security Mode' is set to 'Enabled: Use Outlook Security Group Policy'CIS Microsoft Office Enterprise v1.2.0 L1Windows

CONFIGURATION MANAGEMENT

12.51 Remote Administration of Listener - 'Use encryption if remote administration is required'CIS v1.1.0 Oracle 11g OS L2Unix

ACCESS CONTROL

18.9.5.5 Ensure 'Turn On Virtualization Based Security: Credential Guard Configuration' is set to 'Enabled with UEFI lock' (MS Only)CIS Microsoft Windows Server 2016 STIG v3.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.5 Ensure 'Turn On Virtualization Based Security: Credential Guard Configuration' is set to 'Enabled with UEFI lock' (MS Only)CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.5 Ensure 'Turn On Virtualization Based Security: Credential Guard Configuration' is set to 'Enabled with UEFI lock' (MS Only)CIS Microsoft Windows Server 2019 STIG v3.0.0 NG MSWindows

SYSTEM AND INFORMATION INTEGRITY

ALMA-09-057110 - AlmaLinux OS 9 audit system must protect auditing rules from unauthorized change.DISA CloudLinux AlmaLinux OS 9 STIG v1r2Unix

AUDIT AND ACCOUNTABILITY

Audit Directory Service AccessMSCT Windows Server 1903 DC v1.19.9Windows

AUDIT AND ACCOUNTABILITY

Audit Directory Service AccessMSCT Windows Server 2025 DC v1.0.0Windows

AUDIT AND ACCOUNTABILITY

Audit Directory Service AccessMSCT MSCT Windows Server 2022 DC v1.0.0Windows

AUDIT AND ACCOUNTABILITY

Big Sur - Access Control for Mobile DevicesNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Big Sur - Audit Record Reduction and Report Generation - processingNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

AUDIT AND ACCOUNTABILITY

Big Sur - Audit Record Reduction and Report Generation - processingNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

AUDIT AND ACCOUNTABILITY

Big Sur - Configure the System to Notify upon Account Created ActionsNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL

Big Sur - Configure the System to Notify upon Account Created ActionsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Big Sur - Configure the System to Notify upon Account Removed ActionsNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Big Sur - Disable Wi-Fi When Connected to EthernetNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Protect Against Denial of Service Attacks by Ensuring Rate-Limiting Measures on Network InterfacesNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND COMMUNICATIONS PROTECTION

DISA_STIG_MSSQL_2014_Instance-OS_v2r4.audit from DISA MS SQL Server 2014 Instance v2r4 STIGDISA STIG SQL Server 2014 Instance OS Audit v2r4Windows
DISA_STIG_MSSQL_2016_Instance-OS_v3r4.audit from DISA MS SQL Server 2016 Instance v3r4 STIGDISA STIG SQL Server 2016 Instance OS Audit v3r4Windows
GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config AUD_it exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Chpriv exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config FILE_Mknod exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config PROC_Setpgid exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/config RESTORE_Import exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events AUD_it exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events BACKUP_Export exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events FS_Umount exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PASSWORD_Check exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_Kill exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events PROC_Setpgid exists'DISA STIG AIX 6.1 v1r14Unix

CONFIGURATION MANAGEMENT

GEN002760 - System must be configured to audit all admin/privileged/security actions - '/etc/security/audit/events USER_Change exists'DISA STIG AIX 5.3 v1r2Unix

CONFIGURATION MANAGEMENT

OL6-00-000211 - The telnet daemon must not be running - CHKCONFIGDISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

OL07-00-910055 - The Oracle Linux operating system must protect audit information from unauthorized read, modification, or deletion.DISA Oracle Linux 7 STIG v3r2Unix

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

UBTU-18-010308 - The Ubuntu operating system must be configured so that the audit log directory is not write-accessible by unauthorized users.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010309 - The Ubuntu operating system must allow only authorized accounts to own the audit log directory.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-18-010310 - The Ubuntu operating system must ensure only authorized groups can own the audit log directory and its underlying files.DISA STIG Ubuntu 18.04 LTS v2r15Unix

AUDIT AND ACCOUNTABILITY

UBTU-20-010128 - The Ubuntu operating system must be configured so that the audit log directory is not write-accessible by unauthorized users.DISA Canonical Ubuntu 20.04 LTS STIG v2r2Unix

AUDIT AND ACCOUNTABILITY

UBTU-22-653060 - Ubuntu 22.04 LTS must be configured so that the audit log directory is not write-accessible by unauthorized users.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-901380 - Ubuntu 24.04 LTS must be configured so that the audit log directory is not write-accessible by unauthorized users.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

UBTU-24-909000 - Ubuntu 24.04 LTS audit system must protect auditing rules from unauthorized change.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

AUDIT AND ACCOUNTABILITY

WN10-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Microsoft Windows 10 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-RG-000003-MS - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN16-MS-000020 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Microsoft Windows Server 2016 STIG v2r10Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN19-MS-000020 - Windows Server 2019 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Microsoft Windows Server 2019 STIG v3r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-MS-000020 - Windows Server 2022 local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain-joined member servers.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION