Item Search

NameAudit NamePluginCategory
1 - Application specific logging - start.jar --module=loggingTNS Best Practice Jetty 9 LinuxUnix
2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.LEVEL=INFOTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

2 - Specify file handler in jetty-logging.properties files - org.eclipse.jetty.websocket.LEVEL=DEBUGTNS Best Practice Jetty 9 LinuxUnix

AUDIT AND ACCOUNTABILITY

5 - Granular Log LevelsTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

7 - SSL implementation - start.jar --module=deployTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

7 - SSL implementation - start.jar --module=httpTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

8 - Management IP - .htacess existsTNS Best Practice Jetty 9 LinuxUnix
8 - Management IP - review $jetty_home/contexts xml fileTNS Best Practice Jetty 9 LinuxUnix
9 - Deployment ScannerTNS Best Practice JBoss 7 LinuxUnix

CONFIGURATION MANAGEMENT

12 - Restrict access to logs directory - ownerTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

15 - AuthenticationTNS Best Practice JBoss 7 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

20 - Enable EncryptionTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

25 - Disable Unused ConnectorsTNS Best Practice Jetty 9 LinuxUnix
26 - Setup Client-cert AuthenticationTNS Best Practice Jetty 9 LinuxUnix

IDENTIFICATION AND AUTHENTICATION

27 - Ensure SSLEnabled is set to True for Sensitive Connectors - SSLEngineTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

34 - Ensure Web content directory is on a separate partition from the system filesTNS Best Practice Jetty 9 LinuxUnix
35 - Do not allow custom header status messagesTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

38 - Force SSL for all applicationsTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

39 - Increase the entropy in session identifiersTNS Best Practice Jetty 9 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

45 - Restrict runtime access to sensitive packagesTNS Best Practice Jetty 9 LinuxUnix

ACCESS CONTROL

Adtran : Enable aaaTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : Enable NTPTNS Adtran AOS Best Practice AuditAdtran
Adtran : Enable security mode on virtual access point (VAP)TNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : Firewall - Deny by Default ACLTNS Adtran AOS Best Practice AuditAdtran

SYSTEM AND COMMUNICATIONS PROTECTION

Adtran : Set 'exec' BannerTNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

Adtran : SNMP 'PUBLIC' community string not usedTNS Adtran AOS Best Practice AuditAdtran

IDENTIFICATION AND AUTHENTICATION

Adtran : SNMPv3 is used with 'priv'TNS Adtran AOS Best Practice AuditAdtran

ACCESS CONTROL

CGI-BIN directory should be disabled. 'ScriptAlias'TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Citrix ADC - SNMP - Community namesTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

IDENTIFICATION AND AUTHENTICATION

Citrix ADC - System Parameters - Idle Session TimeoutTenable Best Practice Citrix ADC v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Citrix ADM - NTP - AuthenticationTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

AUDIT AND ACCOUNTABILITY

Citrix ADM - SSL - Settings - TLS v1Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - SSL - Settings - TLSv1.1Tenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - System Settings - Secure Access OnlyTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

SYSTEM AND COMMUNICATIONS PROTECTION

Citrix ADM - User Administration - Password Policy - Invalid Login AttemptsTenable Best Practice Citrix ADM v1.0.0Citrix_Application_Delivery

ACCESS CONTROL

Directory access permissions should be restricted.TNS IBM HTTP Server Best PracticeUnix

CONFIGURATION MANAGEMENT

Logging Directives should be restricted to authorized users. - 'LogFormat'TNS IBM HTTP Server Best PracticeUnix

AUDIT AND ACCOUNTABILITY

MaxClients parameter value should be configured to appropriate value.TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Server version information parameters should be turned off - 'ServerTokens Prod'TNS IBM HTTP Server Best PracticeUnix

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-70-000004 - VMware Postgres must be configured to overwrite older logs when necessary.DISA STIG VMware vSphere 7.0 PostgreSQL v1r2Unix

AUDIT AND ACCOUNTABILITY

VCRP-70-000001 - Envoy must drop connections to disconnected clients.DISA STIG VMware vSphere 7.0 RhttpProxy v1r1Unix

ACCESS CONTROL

WatchGuard : Authentication Settings - 'Authentication User Timeout'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL

WatchGuard : DNS ServersTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Block Address Space ProbesTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : DoS Prevention - Drop IKE Flood AttackTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : Gateway AntiVirus - 'Enabled'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND INFORMATION INTEGRITY

WatchGuard : ICMP Error Handling - 'host-unreachable'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : ICMP Error Handling - 'network-unreachable'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : ICMP Error Handling - 'port-unreachable'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND COMMUNICATIONS PROTECTION

WatchGuard : IPS - 'Enabled'TNS Best Practice WatchGuard Audit 1.0.0WatchGuard

SYSTEM AND INFORMATION INTEGRITY