Item Search

NameAudit NamePluginCategory
1.1 Secure Login and Telnet Disabling - Enable SSH serverTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.2 Password Security Policy - a) The default password length shouldn't be below 8 charactersTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - d) Check either of the following words exist in configuration fileTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-lengthTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.2 Password Security Policy - e) Check for strong-password max-length - strong-password username-related-chk inverseTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

1.4 SNMP Security - b) SNMP serverTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.4 SNMP Security - c) SNMP Security Protection FunctionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.5 FTP/SFTP Access AuthorizationTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.5 FTP/SFTP Access Authorization - login-type-allowedTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

1.7 Log AuditingTenable ZTE ROSNGZTE_ROSNG

AUDIT AND ACCOUNTABILITY

1.8 SSH Strong Algorithm - d) Disable encryption aes192-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - e) Disable encryption aes256-cbcTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - i) Disable diffie-hellman group-exchange-sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.8 SSH Strong Algorithm - k) Disable hmac sha1Tenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - a) VersionTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - b) ciphersuiteTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

1.9 SSL Strong Algorithm - d) renegotiateTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.1 Protection Policy for the CPS Control EngineTenable ZTE ROSNGZTE_ROSNG

SYSTEM AND COMMUNICATIONS PROTECTION

2.3 Disable the Proxy ARP Function - a) No proxyTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.3 Disable the Proxy ARP Function - b) No inter-vlan-proxyTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.3 Disable the Proxy ARP Function - c) No proxy localTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.4 Disable the IP Unreachable FunctionTenable ZTE ROSNGZTE_ROSNG

CONFIGURATION MANAGEMENT

2.5 Product Default BannerTenable ZTE ROSNGZTE_ROSNG

ACCESS CONTROL

3.1 Authentication and Verification of OSPF Routing Protocols - message-digest-keyTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

3.2 Authentication and Verification of ISIS Routing Protocols - authenticationTenable ZTE ROSNGZTE_ROSNG

IDENTIFICATION AND AUTHENTICATION

Adtran : Device InfoTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Adtran : Device VersionTNS Adtran AOS Best Practice AuditAdtran

CONFIGURATION MANAGEMENT

Ensure 'logging buffer size' is greater than or equal to '524288' bytes (512kb)Tenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'logging to monitor' is disabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'OSPF authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP community string' is not the default stringTenable Cisco Firepower Best Practices AuditCisco

IDENTIFICATION AND AUTHENTICATION

Ensure 'TACACS+/RADIUS' is configured correctly - protocolTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, IDENTIFICATION AND AUTHENTICATION

Ensure 'threat-detection statistics' is set to 'tcp-intercept'Tenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure 'Unused Interfaces' is disableTenable Cisco Firepower Best Practices AuditCisco

ACCESS CONTROL

Ensure DNS services are configured correctly - domain-lookupTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure intrusion prevention is enabled for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Extreme : Device InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Extreme : License InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Extreme : switch InfoTNS Extreme ExtremeXOS Best Practice AuditExtreme_ExtremeXOS

CONFIGURATION MANAGEMENT

Huawei: HTTPS Server is configuredTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: HTTPS Server is not configuredTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

Huawei: Review Device Info/VersionTNS Huawei VRP Best Practice AuditHuawei

CONFIGURATION MANAGEMENT

JUSX-DM-000055 - The Juniper SRX Services Gateway must generate log records containing the full-text recording of privileged commands.DISA Juniper SRX Services Gateway NDM v3r2Juniper

AUDIT AND ACCOUNTABILITY

OpenStack Networks and their attached subnetsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

OpenStack Subnet DetailsTenable Best Practices OpenStack v2.0.0OpenStack

CONFIGURATION MANAGEMENT

Rackspace Networks and their attached subnetsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Subnet DetailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of all Domains updated since the last scanTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Ports and their detailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

WatchGuard : Review ABS Policy ListingTNS Best Practice WatchGuard Audit 1.0.0WatchGuard

ACCESS CONTROL