Item Search

NameAudit NamePluginCategory
1.1.3.2.1.1 Ensure 'Allow Trusted Locations on the network' is set to DisabledCIS Microsoft Office Access 2016 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.4.7.2.3.1 Ensure 'Allow Trusted Locations on The Network' to DisabledCIS Microsoft Office Excel 2013 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.4.7.2.3.1 Ensure 'Allow Trusted Locations on The Network' to DisabledCIS Microsoft Office Excel 2016 v1.0.1Windows

CONFIGURATION MANAGEMENT

1.5.6 Create an 'access-list' for use with SNMPCIS Cisco IOS XE 17.x v2.1.1 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMPCIS Cisco IOS XE 16.x v2.1.0 L1Cisco

ACCESS CONTROL, SYSTEM AND INFORMATION INTEGRITY

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP deny secured by ACL'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.5.6 Create an 'access-list' for use with SNMP - 'SNMP permit secured by ACL'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

1.8.7.2.3.1 Ensure 'Allow Trusted Locations on the Network' is set to DisabledCIS Microsoft Office Word 2016 v1.1.0Windows

CONFIGURATION MANAGEMENT

3.4.3.2.4 Ensure iptables default deny firewall policyCIS CentOS Linux 8 Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.2.4 Ensure iptables default deny firewall policyCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.3.4 Ensure ip6tables default deny firewall policyCIS Fedora 28 Family Linux Workstation L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.4.3.3.4 Ensure ip6tables default deny firewall policyCIS Fedora 28 Family Linux Server L1 v2.0.0Unix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.3.4 Ensure ip6tables default deny firewall policyCIS Amazon Linux 2 STIG v2.0.0 L1 ServerUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.5.3.3.4 Ensure ip6tables default deny firewall policyCIS Amazon Linux 2 STIG v2.0.0 L1 WorkstationUnix

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

3.10 Use Identity Aware Proxy (IAP) to Ensure Only Traffic From Google IP Addresses are 'Allowed'CIS Google Cloud Platform v3.0.0 L2GCP

ACCESS CONTROL

4.1.7 Ensure events that modify the system's network environment are collected - /etc/hostsCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - /etc/hostsCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - /etc/issue.netCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl /etc/hostsCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl /etc/issueCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl /etc/sysconfig/networkCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl /etc/sysconfig/networkCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - auditctl b32 sethostnameCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - b32 sethostnameCIS Distribution Independent Linux Server L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.1.7 Ensure events that modify the system's network environment are collected - b32 sethostnameCIS Distribution Independent Linux Workstation L2 v2.0.0Unix

CONFIGURATION MANAGEMENT

4.10.9.1.2 (BL) Ensure 'Prevent installation of devices that match any of these device IDs: Also apply to matching devices that are already installed.' is set to 'True' (checked)CIS Microsoft Intune for Windows 10 v4.0.0 BLWindows

MEDIA PROTECTION

18.9.7.1.1 (L1) Ensure 'Allow installation of devices that match any of these device IDs' is set to 'Enabled: <Org Specific Device IDs>'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL, MEDIA PROTECTION

CIS_Red_Hat_EL8_Server_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Server L1 v3.0.0Unix
CIS_Red_Hat_EL8_Server_L2_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Server L2 v3.0.0Unix
CIS_Red_Hat_EL8_Workstation_L1_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Workstation L1 v3.0.0Unix
CIS_Red_Hat_EL8_Workstation_L2_v3.0.0.audit from CIS Red Hat Enterprise Linux 8 Benchmark v3.0.0CIS Red Hat EL8 Workstation L2 v3.0.0Unix
DISA_Red_Hat_Enterprise_Linux_8_STIG_v2r3.audit from DISA Red Hat Enterprise Linux 8 STIG v2r3DISA Red Hat Enterprise Linux 8 STIG v2r3Unix
DISA_Red_Hat_Enterprise_Linux_9_STIG_v2r4.audit from DISA Red Hat Enterprise Linux 9 STIG v2r4DISA Red Hat Enterprise Linux 9 STIG v2r4Unix
DISA_STIG_Red_Hat_Enterprise_Linux_7_v3r15.audit from DISA Red Hat Enterprise Linux 7 v3r15 STIGDISA Red Hat Enterprise Linux 7 STIG v3r15Unix
DISA_STIG_RHEL_5_v1r18.audit from DISA Red Hat Enterprise Linux 5 STIG v1r18DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix
DISA_STIG_RHEL_6_v2r2.audit from DISA Red Hat Enterprise Linux 6 v2r2 STIGDISA Red Hat Enterprise Linux 6 STIG v2r2Unix
DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisEnabledDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisLevelDISA McAfee VirusScan 8.8 Managed Client STIG v6r1Windows

SYSTEM AND INFORMATION INTEGRITY

DTAVSEL-003 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Local Client v1r6Unix

SYSTEM AND INFORMATION INTEGRITY

RHEV: Review Events with severity >= ErrorTenable RedHat Enterprise VirtualizationRHEV
SOL-11.1-020110 - The NIS package must not be installed.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020130 - The FTP daemon must not be installed unless required.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020130 - The FTP daemon must not be installed unless required.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020150 - The telnet service daemon must not be installed unless required.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020150 - The telnet service daemon must not be installed unless required.DISA STIG Solaris 11 SPARC v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-020160 - The UUCP service daemon must not be installed unless required.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-100040 - The audit system must identify in which zone an event occurred.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

SOL-11.1-100050 - The audit system must maintain a central audit trail for all zones.DISA STIG Solaris 11 X86 v3r1Unix

CONFIGURATION MANAGEMENT

WN12-CC-000004 - Network Bridges must be prohibited in Windows.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN12-CC-000004 - Network Bridges must be prohibited in Windows.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

CONFIGURATION MANAGEMENT