2.1.10 (L1) Ensure DMARC Records for all Exchange Online domains are published | CIS Microsoft 365 Foundations v5.0.0 L1 E3 | microsoft_azure | SYSTEM AND COMMUNICATIONS PROTECTION |
18.9.97.2.2 (L2) Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Microsoft Windows 8.1 v2.4.1 L2 | Windows | CONFIGURATION MANAGEMENT, RISK ASSESSMENT |
18.9.97.2.2 Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Windows 7 Workstation Level 2 v3.2.0 | Windows | ACCESS CONTROL |
18.9.102.2.2 (L2) Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Microsoft Windows Server 2008 R2 Member Server Level 2 v3.3.1 | Windows | CONFIGURATION MANAGEMENT |
18.10.88.2.2 (L1) Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1 | Windows | CONFIGURATION MANAGEMENT |
18.10.88.2.2 Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 MS | Windows | CONFIGURATION MANAGEMENT |
18.10.89.2.2 (L2) Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Microsoft Windows Server 2025 v1.0.0 L2 DC | Windows | CONFIGURATION MANAGEMENT |
18.10.89.2.2 (L2) Ensure 'Allow remote server management through WinRM' is set to 'Disabled' | CIS Windows Server 2012 R2 MS L2 v3.0.0 | Windows | CONFIGURATION MANAGEMENT |
CIS Control 1 (1.4) Maintain Detailed Asset Inventory | CAS Implementation Group 1 Audit File | Unix | CONFIGURATION MANAGEMENT |
CIS Control 10 (10.2) Perform Complete System Backups | CAS Implementation Group 1 Audit File | Unix | CONTINGENCY PLANNING |
CIS_Apache_Tomcat_8_L2_v1.1.0.audit from CIS Apache Tomcat 8 Benchmark | CIS Apache Tomcat 8 L2 v1.1.0 | Unix | |
CIS_Apache_Tomcat_10_L1_v1.1.0.audit from CIS Apache Tomcat 10 Benchmark | CIS Apache Tomcat 10 L1 v1.1.0 | Unix | |
CIS_Apache_Tomcat_10_L2_v1.1.0.audit from CIS Apache Tomcat 10 Benchmark | CIS Apache Tomcat 10 L2 v1.1.0 | Unix | |
CIS_Bottlerocket_v1.0.0_L1.audit from CIS Bottlerocket Benchmark Level 1 | CIS Bottlerocket L1 | Unix | |
CIS_CentOS_Linux_8_v2.0.0_L1_Server.audit from CIS CentOS Linux 8 Benchmark v2.0.0 | CIS CentOS Linux 8 Server L1 v2.0.0 | Unix | |
CIS_CentOS_Linux_8_v2.0.0_L1_Workstation.audit from CIS CentOS Linux 8 Benchmark v2.0.0 | CIS CentOS Linux 8 Workstation L1 v2.0.0 | Unix | |
CIS_Debian_Linux_9_Server_v1.0.1_L1.audit from CIS Debian Linux 9 Benchmark | CIS Debian 9 Server L1 v1.0.1 | Unix | |
CIS_Debian_Linux_10_v2.0.0_L1_Server.audit from CIS Debian Linux 10 Benchmark v2.0.0 | CIS Debian 10 Server L1 v2.0.0 | Unix | |
CIS_Debian_Linux_12_v1.1.0_L2_Workstation.audit from CIS Debian Linux 12 Benchmark v1.1.0 | CIS Debian Linux 12 v1.1.0 L2 Workstation | Unix | |
CIS_Oracle_Linux_7_v4.0.0_L1_Server.audit from CIS Oracle Linux 7 Benchmark v4.0.0 | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | |
CIS_Oracle_Linux_7_v4.0.0_L1_Workstation.audit from CIS Oracle Linux 7 Benchmark v4.0.0 | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | |
CIS_Oracle_Linux_7_v4.0.0_L2_Server.audit from CIS Oracle Linux 7 Benchmark v4.0.0 | CIS Oracle Linux 7 v4.0.0 L2 Server | Unix | |
CIS_Oracle_Linux_9_v2.0.0_L1_Server.audit from CIS Oracle Linux 9 Benchmark v2.0.0 | CIS Oracle Linux 9 v2.0.0 L1 Server | Unix | |
CIS_Oracle_Server_18c_v1.1.0_L1_Windows.audit from CIS Oracle Database 18c Benchmark v1.1.0 | CIS Oracle Server 18c Windows v1.1.0 | Windows | |
CIS_Oracle_Server_19c_v1.2.0_L1_Windows.audit from CIS Oracle Database 19c Benchmark v1.2.0 | CIS Oracle Server 19c Windows v1.2.0 | Windows | |
CIS_Rocky_Linux_8_v2.0.0_L1_Server.audit from CIS Rocky Linux 8 Benchmark v2.0.0 | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | |
CIS_Rocky_Linux_8_v2.0.0_L1_Workstation.audit from CIS Rocky Linux 8 Benchmark v2.0.0 | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | |
CIS_Rocky_Linux_9_v2.0.0_L2_Workstation.audit from CIS Rocky Linux 9 Benchmark v2.0.0 | CIS Rocky Linux 9 v2.0.0 L2 Workstation | Unix | |
Configure an IPsec Static Route | Tenable Cisco Viptela SD-WAN - vEdge | Cisco_Viptela | ACCESS CONTROL |
EX13-CA-000085 - Exchange must have Audit data on separate partitions. | DISA Microsoft Exchange 2013 Client Access Server STIG v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
EX13-MB-000100 - Exchange Mailbox databases must reside on a dedicated partition. | DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-MB-000235 - Exchange Internal Receive connectors must not allow anonymous connections. | DISA Microsoft Exchange 2013 Mailbox Server STIG v2r3 | Windows | SYSTEM AND INFORMATION INTEGRITY |
EX16-MB-000120 - Exchange must protect audit data against unauthorized read access. | DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6 | Windows | AUDIT AND ACCOUNTABILITY |
EX16-MB-000550 - The Exchange Receive connector timeout must be limited. | DISA Microsoft Exchange 2016 Mailbox Server STIG v2r6 | Windows | ACCESS CONTROL |
EX19-MB-000052 - Exchange must protect audit data against unauthorized read access. | DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
EX19-MB-000053 - Exchange must protect audit data against unauthorized access. | DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
EX19-MB-000058 - Exchange audit data must be on separate partitions. | DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2 | Windows | AUDIT AND ACCOUNTABILITY |
EX19-MB-000158 - The Exchange receive connector timeout must be limited. | DISA Microsoft Exchange 2019 Mailbox Server STIG v2r2 | Windows | ACCESS CONTROL |
HONW-09-010400 - Honeywell Mobility Edge Android Pie devices must configured to disallow outgoing beam. | AirWatch - DISA Honeywell Android 9.x COBO v1r2 | MDM | CONFIGURATION MANAGEMENT |
IISW-SV-000153 - An IIS 8.5 web server must maintain the confidentiality of controlled information during transmission through the use of an approved TLS version. | DISA IIS 8.5 Server v2r7 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
MSCT_Microsoft_Edge_Version_79_v1.0.0.audit from MSCT Microsoft Edge Version 79 Security Baseline | MSCT Microsoft Edge Version 79 v1.0.0 | Windows | |
MSCT_Microsoft_Edge_Version_80_v1.0.0.audit from MSCT Microsoft Edge Version 80 Security Baseline | MSCT Microsoft Edge Version 80 v1.0.0 | Windows | |
MSCT_Microsoft_Edge_Version_84_v1.0.0.audit from MSCT Microsoft Edge Version 84 Security Baseline | MSCT Edge v84 v1.0.0 | Windows | |
MSCT_Microsoft_Edge_Version_88_v1.0.0.audit from MSCT Microsoft Edge Version 88 Security Baseline | MSCT Edge v88 v1.0.0 | Windows | |
MSCT_Microsoft_Edge_Version_114_v1.0.0.audit from MSCT Microsoft Edge Version 114 Security Baseline | MSCT Edge v114 v1.0.0 | Windows | |
MSCT_Microsoft_Edge_Version_132_v1.0.0.audit from MSCT Microsoft Edge Version 132 Security Baseline | MSCT Edge v132 v1.0.0 | Windows | |
VCSA-80-000148 - The vCenter Server must be configured to send logs to a central log server. | DISA VMware vSphere 8.0 vCenter STIG v2r2 | VMware | AUDIT AND ACCOUNTABILITY |
WBLC-08-000231 - Oracle WebLogic must protect the confidentiality of applications and leverage transmission protection mechanisms, such as TLS and SSL VPN, when deploying applications - AdminServer Listen Port | Oracle WebLogic Server 12c Linux v2r2 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WBLC-08-000231 - Oracle WebLogic must protect the confidentiality of applications and leverage transmission protection mechanisms, such as TLS and SSL VPN, when deploying applications - AdminServer SSL Listen Port | Oracle WebLogic Server 12c Linux v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
WBLC-08-000239 - Oracle WebLogic must employ approved cryptographic mechanisms when transmitting sensitive data - SSL Listen Port | Oracle WebLogic Server 12c Linux v2r2 Middleware | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |