Item Search

NameAudit NamePluginCategory
1.6.1.6 Ensure no unconfined daemons existCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.1.4 Ensure echo services are not enabled - echo-streamCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.1.5 Ensure time services are not enabled - time-dgramCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.1.10 Ensure xinetd is not enabledCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

2.1.13 Disable chargen-streamCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

2.2.18 Ensure mail transfer agent is configured for local-only modeCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.1.6 Restrict Published Information (if publishing is required) - publish-binf=noCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

3.2.1 Ensure IP forwarding is disabled - 'net.ipv4.ip_forward = 0 /sbin/sysctl'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure packet redirect sending is disabled - 'net.ipv4.conf.default.send_redirects = 0 /etc/sysctl.conf /etc/sysctl.d/*'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.2.2 Ensure packet redirect sending is disabled - 'net.ipv4.conf.default.send_redirects = 0 /sbin/sysctl'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.3 Ensure secure ICMP redirects are not accepted - 'net.ipv4.conf.default.secure_redirects = 0 /sbin/sysctl'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.5 Ensure broadcast ICMP requests are ignored - sysctlCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.6 Ensure bogus ICMP responses are ignored - sysctlCIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1 /etc/sysctl.conf /etc/sysctl.d/*'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1 /sbin/sysctl'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.all.rp_filter = 1 /sbin/sysctl'CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.7 Ensure Reverse Path Filtering is enabled - 'net.ipv4.conf.default.rp_filter = 1 /sbin/sysctl'CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.8 Ensure TCP SYN Cookies is enabled - configCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.9 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0 /etc/sysctl.conf /etc/sysctl.d/*'CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.9 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0 /sbin/sysctl'CIS Red Hat 6 Server L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.3.9 Ensure IPv6 router advertisements are not accepted - 'net.ipv6.conf.all.accept_ra = 0 /sbin/sysctl'CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.5.2 Ensure SCTP is disabledCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

3.5.4 Ensure TIPC is disabledCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

3.5.4 Ensure TIPC is disabledCIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - $ModLoad imtcpCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.2.1.6 Ensure remote rsyslog messages are only accepted on designated log hosts - InputTCPServerRun 514CIS Red Hat 6 Workstation L1 v3.0.0Unix

CONFIGURATION MANAGEMENT

4.3.1 Deactivate Wireless InterfacesCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

4.6.2 Disable SCTPCIS Red Hat Enterprise Linux 5 L1 v2.2.1Unix

CONFIGURATION MANAGEMENT

5.3.4 Ensure SSH Protocol is set to 2CIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

5.3.9 Ensure SSH IgnoreRhosts is enabledCIS Oracle Linux 6 Workstation L1 v2.0.0Unix

CONFIGURATION MANAGEMENT

Android Device Configuration - CameraTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Android Device Configuration - Google account auto syncTenable Best Practices for Microsoft Intune Android v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Big Sur - Enable SSH Server for Remote Access SessionsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT

Disable AutomountingTenable Cisco Firepower Management Center OS Best Practices AuditUnix

CONFIGURATION MANAGEMENT

Do not allow drive redirectionMSCT Windows 10 1909 v1.0.0Windows

CONFIGURATION MANAGEMENT

iOS Compliance Policy - Jailbroken devicesTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Adding Game Center friendsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Block iCloud Document syncTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Configuration profile changesTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Device name modificationTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Safari fraud warningsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Simple passwordsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

iOS Device Management - Viewing corporate documents in unmanaged appsTenable Best Practices for Microsoft Intune iOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

macOS Compliance Policy - Block Simple PasswordsTenable Best Practices for Microsoft Intune macOS v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Compliance Policy - Block USB debugging on deviceTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - CameraTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - End-user access to DefenderTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - GeolocationTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - Network and InternetTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Windows Device Configuration - NFCTenable Best Practices for Microsoft Intune Windows v1.0microsoft_azure

ACCESS CONTROL, CONFIGURATION MANAGEMENT