Item Search

NameAudit NamePluginCategory
1.1.3.9.11 Configure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 default)'CIS Windows 8 L1 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.3 Ensure Installation of Community PackagesCIS PostgreSQL 9.5 OS v1.1.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.5 Enable OS X update installsCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.18 OL08-00-010141CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

ACCESS CONTROL

2.1.2 Ensure X Window System is not installedCIS Debian Family Server L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.1.20 Ensure X window server services are not in useCIS AlmaLinux OS 10 v1.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.2.1 Ensure X Window System is not installedCIS Ubuntu Linux 18.04 LXD Container L1 v1.0.0Unix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 L1 ServerUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installed - rpmCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.2 Ensure X11 Server components are not installed - systemctlCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

CONFIGURATION MANAGEMENT

2.2.20 Ensure X window server services are not in useCIS Amazon Linux 2 v4.0.0 L2 ServerUnix

CONFIGURATION MANAGEMENT

2.5 Autologout - 'autologout.console.timeout <= 5'TNS NetApp Data ONTAP 7GNetApp

ACCESS CONTROL

5 - Granular Log LevelsTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

6 - Run your Instance as non privileged userTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

7.1 Wireless technology on OS XCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix
13 - Disable stacktrace in response bodyTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND INFORMATION INTEGRITY

16 - ORB Subsystem - Initializers OnTNS Best Practice JBoss 7 LinuxUnix

SYSTEM AND COMMUNICATIONS PROTECTION

18 - Role Based Authentication per queueTNS Best Practice JBoss 7 LinuxUnix

ACCESS CONTROL

Allow Active X One Off FormsMSCT Microsoft 365 Apps for Enterprise 2112 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow Active X One Off FormsMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow Active X One Off FormsMSCT M365 Apps for enterprise 2412 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow Active X One Off FormsMSCT Office 2016 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow Active X One Off FormsMSCT M365 Apps for enterprise 2312 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow Active X One Off FormsMSCT Office 365 ProPlus 1908 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Allow Active X One Off FormsMSCT Microsoft 365 Apps for Enterprise 2206 v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Disable Wi-Fi InterfaceNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL

Big Sur - Disable Wi-Fi InterfaceNIST macOS Big Sur v1.4.0 - 800-53r4 LowUnix

ACCESS CONTROL

Big Sur - Disable Wi-Fi InterfaceNIST macOS Big Sur v1.4.0 - 800-53r5 LowUnix

ACCESS CONTROL

Big Sur - Disable Wi-Fi InterfaceNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

Catalina - Disable Wi-Fi InterfaceNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION

GEN000000-LNX00360 - The X server must have the correct options enabled - ':0 /usr/bin/X:0'DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT

GEN000000-LNX00360 - The X server must have the correct options enabled - ':0 /usr/bin/X:0'DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

CONFIGURATION MANAGEMENT

GEN005160 - Any X Windows host must write .Xauthority files.DISA AIX 5.3 STIG v1r2Unix

CONFIGURATION MANAGEMENT

GEN005240 - The .Xauthority utility must only permit access to authorized hosts.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

JBOS-AS-000115 - JBoss Log Formatter must be configured to produce log records that establish the date and time the events occurred.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

JBOS-AS-000120 - JBoss must be configured to produce log records that establish which hosted application triggered the events.DISA JBoss Enterprise Application Platform 6.3 STIG v2r6Unix

AUDIT AND ACCOUNTABILITY

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r4 LowUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Disable Wi-Fi InterfaceNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

OL07-00-010492 - Oracle Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Oracle Linux 7 STIG v3r5Unix

ACCESS CONTROL

RHEL-07-010492 - Red Hat Enterprise Linux operating systems version 7.2 or newer booted with United Extensible Firmware Interface (UEFI) must have a unique name for the grub superusers account when booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 7 STIG v3r15Unix

ACCESS CONTROL

RHEL-08-010141 - RHEL 8 operating systems booted with United Extensible Firmware Interface (UEFI) must require a unique superusers name upon booting into single-user mode and maintenance.DISA Red Hat Enterprise Linux 8 STIG v2r7Unix

ACCESS CONTROL

RHEV: Clusters Memory BalooningTenable RedHat Enterprise VirtualizationRHEV
RHEV: Storage Domains - Backup storageTenable RedHat Enterprise VirtualizationRHEV
SLEM-05-651030 - Advanced Intrusion Detection Environment (AIDE) must verify the baseline SLEM 5 configuration at least weekly.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLEM-05-653025 - SLEM 5 must allocate audit record storage capacity to store at least one week of audit records when audit records are not immediately sent to a central audit record storage facility.DISA SUSE Linux Enterprise Micro SLEM 5 STIG v1r3Unix

AUDIT AND ACCOUNTABILITY

SOL-11.1-020560 - X Window System connections that are not required must be disabled.DISA Solaris 11 X86 STIG v3r4Unix

CONFIGURATION MANAGEMENT