Item Search

NameAudit NamePluginCategory
1.4 Ensure that the underlying Internet Information Services (IIS) Authentication module is set to use Kerberos as its Auth ProviderCIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

1.4 Ensure that the underlying Internet Information Services (IIS) Authentication module is set to use Kerberos as its Authentication ProviderCIS Microsoft SharePoint 2019 OS v1.0.0Windows

SYSTEM AND COMMUNICATIONS PROTECTION

2.2 Disable/Modify Default Accts - 'SNMP default community strings have been removed'TNS NetApp Data ONTAP 7GNetApp
2.3.5.3 Ensure 'Domain controller: LDAP server channel binding token requirements' is set to 'Always' (DC Only)CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

2.3.10.8 Configure 'Network access: Remotely accessible registry paths and sub-paths' is configured - Network access: Remotely accessible registry paths and sub-paths is configuredCIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL

2.3.10.8 Ensure 'Network access: Remotely accessible registry paths and sub-paths'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.4 Disable NIS Server Services - serverCIS Solaris 11.1 L1 v1.0.0Unix
2.4 Disable NIS Server Services - serverCIS Solaris 11.2 L1 v1.1.0Unix
3.3.2 Include TSIG key in named.conf 'TSIG key 2 permissions'CIS ISC BIND 9.0/9.5 v2.0.0Unix
4.7 Ensure Unlisted File Extensions are not allowed - ApplicationsCIS IIS 7 L1 v1.8.0Windows

CONFIGURATION MANAGEMENT

6.2 Ensure 'backend' runtime parameters are configured correctlyCIS PostgreSQL 10 DB v1.0.0PostgreSQLDB

CONFIGURATION MANAGEMENT

6.2 Ensure 'backend' runtime parameters are configured correctlyCIS PostgreSQL 11 DB v1.0.0PostgreSQLDB

CONFIGURATION MANAGEMENT

6.2 Ensure FTP Logon attempt restrictions is enabled - Deny IP AddressCIS IIS 8.0 v1.5.1 Level 1Windows

AUDIT AND ACCOUNTABILITY

18.3.6 (L1) Ensure 'Extended Protection for LDAP Authentication (Domain Controllers only)' is set to 'Enabled: Enabled, always (recommended)' (DC Only)CIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.3.6 (L1) Ensure 'Extended Protection for LDAP Authentication (Domain Controllers only)' is set to 'Enabled: Enabled, always (recommended)' (DC Only)CIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.4.5 (L2) Ensure 'MSS: (KeepAliveTime) How often keep-alive packets are sent in milliseconds' is set to 'Enabled: 300,000 or 5 minutes (recommended)'CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

18.8.22.1.5 (L2) Ensure 'Turn off Internet File Association service' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

18.8.22.1.12 (L2) Ensure 'Turn off Windows Customer Experience Improvement Program' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

18.9.65.3.3.1 (L2) Ensure 'Do not allow COM port redirection' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

18.9.65.3.3.3 (L2) Ensure 'Do not allow LPT port redirection' is set to 'Enabled'CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

18.9.65.3.10.1 (L2) Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less, but not Never (0)'CIS Microsoft Windows Server 2008 Domain Controller Level 2 v3.3.1Windows

ACCESS CONTROL

18.9.103.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2008 R2 Domain Controller Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

18.10.89.1 Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.89.1 Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.10.89.1 Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2022 STIG v2.0.0 L2 Domain ControllerWindows

CONFIGURATION MANAGEMENT

18.10.90.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Windows Server 2012 MS L2 v3.0.0Windows

CONFIGURATION MANAGEMENT

18.10.90.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2025 v1.0.0 L2 DCWindows

CONFIGURATION MANAGEMENT

18.10.90.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2025 v1.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.90.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2022 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.10.90.1 (L2) Ensure 'Allow Remote Shell Access' is set to 'Disabled'CIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

ARST-L2-000160 - The Arista MLS layer 2 switch must have all trunk links enabled statically.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

CONFIGURATION MANAGEMENT

CISC-RT-000710 - The Cisco PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA Cisco IOS XR Router RTR STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

DTOO113 - Excel - Open/Save actions for Excel 2 macrosheets and add-in files must be blocked.DISA STIG Office 2010 Excel v1r11Windows

SYSTEM AND COMMUNICATIONS PROTECTION

GEN003080-2 - Files in cron script directories must have mode 0700 or less permissive - '/etc/cron.daily/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN003080-2 - Files in cron script directories must have mode 0700 or less permissive - '/etc/cron.monthly/*'DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

GEN005307 - SNMP must require the use of a FIPS 140-2 encryption algorithm for protecting the privacy of SNMP messages.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

ACCESS CONTROL

GEN005307 - The SNMP service must require the use of a FIPS 140-2 approved encryption algorithm for protecting the privacy of SNMP messages.DISA STIG for Oracle Linux 5 v2r1Unix

ACCESS CONTROL

JUEX-RT-000670 - The Juniper PE router must be configured to implement Internet Group Management Protocol (IGMP) or Multicast Listener Discovery (MLD) snooping for each Virtual Private LAN Services (VPLS) bridge domain.DISA Juniper EX Series Router v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

OH12-1X-000021 - OHS must have a log directory location defined to generate information for use by external applications or entities to monitor and control remote access.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

ACCESS CONTROL

OH12-1X-000042 - OHS must have a log directory location defined to generate log records for system startup and shutdown, system access, and system authentication logging.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OH12-1X-000081 - OHS must be configured to store error log files to an appropriate storage device from which other tools can be configured to reference those log files for diagnostic/forensic purposes.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

AUDIT AND ACCOUNTABILITY

OH12-1X-000157 - OHS must have the AliasMatch directive disabled for the OHS manuals.DISA STIG Oracle HTTP Server 12.1.3 v2r3Unix

CONFIGURATION MANAGEMENT

SonicWALL - Syslog server - >=1 server configuredTNS SonicWALL v5.9SonicWALL
SPLK-CL-000390 - Splunk Enterprise must be installed in FIPS mode to implement NIST FIPS-approved cryptography for all cryptographic functions.DISA STIG Splunk Enterprise 8.x for Linux v2r2 STIG REST APISplunk

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

SQL2-00-013600 - SQL Server must protect audit information from any type of unauthorized access.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

AUDIT AND ACCOUNTABILITY

SQL2-00-013700 - SQL Server must protect audit information from unauthorized modification.DISA STIG SQL Server 2012 Database OS Audit v1r20Windows

AUDIT AND ACCOUNTABILITY

SQL4-00-013600 - The audit information produced by SQL Server must be protected from unauthorized read access.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

SQL4-00-013700 - The audit information produced by SQL Server must be protected from unauthorized modification.DISA STIG SQL Server 2014 Instance DB Audit v2r4MS_SQLDB

AUDIT AND ACCOUNTABILITY

WBLC-05-000176 - Oracle WebLogic must use cryptographic modules that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance when encrypting stored data - JAVA_OPTIONSOracle WebLogic Server 12c Linux v2r2Unix

IDENTIFICATION AND AUTHENTICATION

WPAW-00-000400 - Administrative accounts of all high-value IT resources must be assigned to a specific administrative tier in Active Directory to separate highly privileged administrative accounts from less privileged administrative accounts.DISA MS Windows Privileged Access Workstation v3r1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT