Item Search

NameAudit NamePluginCategory
1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device managementCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMPCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSHCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPSCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

2.2.7 Ensure 'Back up files and directories' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.8 Ensure 'Change the system time' is set to 'Administrators, LOCAL SERVICE'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.9 Ensure 'Change the time zone' is set to 'Administrators, LOCAL SERVICE, Users'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.10 Ensure 'Create a pagefile' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.11 Ensure 'Create a token object' is set to 'No One'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.12 Ensure 'Create global objects' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.14 Configure 'Create symbolic links'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.21 Ensure 'Enable computer and user accounts to be trusted for delegation' is set to 'No One'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.22 Ensure 'Force shutdown from a remote system' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.24 Ensure 'Impersonate a client after authentication' is set to 'Administrators, LOCAL SERVICE, NETWORK SERVICE, SERVICE'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.25 Ensure 'Increase scheduling priority' is set to 'Administrators' - AdministratorsCIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.25 Ensure 'Increase scheduling priority' is set to 'Administrators' - Window Manager\Window Manager Group'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.26 Ensure 'Load and unload device drivers' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.30 Ensure 'Manage auditing and security log' is set to 'Administrators'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

2.2.35 Ensure 'Profile system performance' is set to 'Administrators, NT SERVICE\WdiServiceHost'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.4.1 (L1) Ensure 'Devices: Allowed to format and eject removable media' is set to 'Administrators and Interactive Users'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

MEDIA PROTECTION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

3.130 - User Account Control - Behavior of elevation prompt for administratorsDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.132 - User Account Control - Detect Application InstallationsDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.134 - User Account Control - Elevate UIAccess applications that are in secure locationsDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.135 - User Account Control - Switch to secure desktopDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.136 - User Account Control - Non UAC Compliant Application VirtualizationDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

3.141 - User Account Control - Executable ElevationDISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

5.132 - Require username and password to elevate a running application.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

18.9.85.1 (L1) Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.85.1 Ensure 'Allow user control over installs' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.85.2 Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

19.7.41.1 Ensure 'Always install with elevated privileges' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

DTBI485 - Protected Mode must be enforced (Internet zone).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI490 - Protected Mode must be enforced (Restricted Sites zone).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI610 - Internet Explorer Processes for Zone Elevation must be enforced (Reserved).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI612 - Internet Explorer Processes for Zone Elevation must be enforced (Explorer).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DTBI614 - Internet Explorer Processes for Zone Elevation must be enforced (IExplore).DISA STIG Microsoft Internet Explorer 9 v1r15Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EPAS-00-005800 - The EDB Postgres Advanced Server must isolate security functions from nonsecurity functions.EnterpriseDB PostgreSQL Advanced Server DB v2r1PostgreSQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010170 - OL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Oracle Linux 8 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010423 - OL 8 must clear memory when it is freed to prevent use-after-free attacks.DISA Oracle Linux 8 STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010170 - RHEL 8 must use a Linux Security Module configured to enforce limits on system services.DISA Red Hat Enterprise Linux 8 STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-432015 - Ubuntu 22.04 LTS must ensure only users who need access to security functions are part of sudo group.DISA Canonical Ubuntu 22.04 LTS STIG v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-600130 - Ubuntu 24.04 LTS must ensure only users who need access to security functions are part of sudo group.DISA Canonical Ubuntu 24.04 LTS STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-67-000017 - VMware Postgres must not allow schema access to unauthorized accounts.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCPG-70-000015 - VMware Postgres must not allow schema access to unauthorized accounts.DISA STIG VMware vSphere 7.0 PostgreSQL v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000051 - The vCenter Server users must have the correct roles assigned.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

WINRG-000003 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000037 - Local administrator accounts must have their privileged token filtered to prevent elevated privileges from being used over the network on domain systems.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-CC-000200 - Administrator accounts must not be enumerated during elevation.DISA Microsoft Windows 11 STIG v2r3Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000420 - Windows Server 2022 User Account Control (UAC) must be configured to detect application installations and prompt for elevation.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-SO-000430 - Windows Server 2022 User Account Control (UAC) must only elevate UIAccess applications that are installed in secure locations.DISA Microsoft Windows Server 2022 STIG v2r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION