ESXi : config-firewall-access - 'Active Directory All blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'DNS Client allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'FTP Client blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'Software iSCSI Client blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'SSH Client blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'SSH Server allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'vCenter Update Manager blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'VM serial port connected to vSPC blocked' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'vMotion allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-firewall-access - 'vSphere Client allowed' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi : config-persistent-logs | VMWare vSphere 5.X Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : config-snmp - 'snmp.receiver.X.community' | VMWare vSphere 5.X Hardening Guide | VMware | IDENTIFICATION AND AUTHENTICATION |
ESXi : config-snmp - 'snmp.receiver.X.enabled' | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
ESXi : create-local-admin | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : disable-dcui | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
ESXi : enable-auth-proxy | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : enable-lockdown-mode | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : enable-remote-syslog | VMWare vSphere 5.X Hardening Guide | VMware | AUDIT AND ACCOUNTABILITY |
ESXi : limit-cim-access | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : mask-zone-san | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : verify-acceptance-level-accepted | VMWare vSphere 5.X Hardening Guide | VMware | |
ESXi : verify-dvfilter-bind | VMWare vSphere 5.X Hardening Guide | VMware | ACCESS CONTROL |
ESXi : vpxuser-password-age | VMWare vSphere 5.X Hardening Guide | VMware | IDENTIFICATION AND AUTHENTICATION |
OL08-00-010140 - OL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require authentication upon booting into single-user mode and maintenance. | DISA Oracle Linux 8 STIG v2r4 | Unix | ACCESS CONTROL |
SSO : check-SSO-Password-expiration | VMWare vSphere 5.X Hardening Guide | VMware | |
SSO : check-SSO-Password-policy | VMWare vSphere 5.X Hardening Guide | VMware | |
SSO : restrict-sso-db-user | VMWare vSphere 5.X Hardening Guide | VMware | |
SSO : SSO-DB-password-recorded | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : change-default-password | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : disable-datastore-web | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : no-self-signed-certs | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : restrict-admin-role | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : restrict-certificate-access | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : restrict-Linux-clients | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : thick-client-timeout | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : use-service-accounts | VMWare vSphere 5.X Hardening Guide | VMware | |
vCenter : verify-ssl-certificates | VMWare vSphere 5.X Hardening Guide | VMware | |
VCSA : change-default-password | VMWare vSphere 5.X Hardening Guide | VMware | |
VCSA : restrict-network-access | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : isolate-storage-network-airgap | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : label-portgroups | VMWare vSphere 5.X Hardening Guide | VMware | CONFIGURATION MANAGEMENT |
vNetwork : reject-forged-transmit - 'PortGroup' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
vNetwork : reject-promiscuous-mode - 'PortGroup' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
vNetwork : reject-promiscuous-mode - 'vSwitch' | VMWare vSphere 5.X Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
vNetwork : reject-promiscuous-mode-dvportgroup | VMWare vSphere 5.X Hardening Guide | VMware | |
vNetwork : verify-vlan-id | VMWare vSphere 5.X Hardening Guide | VMware | |
VUM : restrict-vum-db-user | VMWare vSphere 5.X Hardening Guide | VMware | |
WN12-00-000210 - PowerShell script block logging must be enabled on Windows 2012/2012 R2 - Enabled | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | AUDIT AND ACCOUNTABILITY |
WN12-00-000210 - PowerShell script block logging must be enabled on Windows 2012/2012 R2 - Enabled | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | AUDIT AND ACCOUNTABILITY |
WN12-00-000210 - PowerShell script block logging must be enabled on Windows 2012/2012 R2 - Patch | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | AUDIT AND ACCOUNTABILITY |