Item Search

NameAudit NamePluginCategory
1.102 (L1) Ensure 'Enable the Search bar' is set to 'Disabled'CIS Microsoft Edge v3.0.0 L1Windows

CONFIGURATION MANAGEMENT

2.3.10.7 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

ACCESS CONTROL

2.3.10.7 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BL NGWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2022 Stand-alone v1.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2019 Stand-alone v3.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.7 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

ACCESS CONTROL

2.3.10.7 Ensure 'Network access: Remotely accessible registry paths'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

ACCESS CONTROL

2.3.10.7 Ensure 'Network access: Remotely accessible registry paths'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2008 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Windows Server 2012 MS L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2008 R2 Domain Controller Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.10.8 (L1) Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2025 v1.0.0 L1 DCWindows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2019 v4.0.0 L1 MSWindows

ACCESS CONTROL

2.3.10.8 (L1) Ensure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2022 v4.0.0 L1 DCWindows

ACCESS CONTROL

2.3.10.10 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2016 STIG v3.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.10.10 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Member ServerWindows

ACCESS CONTROL

2.3.10.10 Configure 'Network access: Remotely accessible registry paths' is configuredCIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

ACCESS CONTROL

2.3.10.10 Ensure 'Network access: Restrict clients allowed to make remote calls to SAM' is set to 'Administrators: Remote Access: Allow' (MS only) - Administrators: Remote Access: AllowCIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

ACCESS CONTROL

2.3.11.5 Ensure 'Network security: Do not store LAN Manager hash value on next password change' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

8.1.9 Configure a Client-side Stash File for TLS (SSL_CLNT_STASH)CIS IBM DB2 11 v1.1.0 Windows OS Level 1Windows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.8.7.1.2 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

MEDIA PROTECTION

18.9.5.7 (L1) Ensure 'Turn On Virtualization Based Security: Kernel-mode Hardware-enforced Stack Protection' is set to 'Enabled: Enabled in enforcement mode'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.7 (L1) Ensure 'Turn On Virtualization Based Security: Kernel-mode Hardware-enforced Stack Protection' is set to 'Enabled: Enabled in enforcement mode'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.5.7 (L1) Ensure 'Turn On Virtualization Based Security: Kernel-mode Hardware-enforced Stack Protection' is set to 'Enabled: Enabled in enforcement mode'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.2 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 11 Stand-alone v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.2 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 11 Enterprise v4.0.0 BitLockerWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.2 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 11 Stand-alone v4.0.0 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.7.1.5 (BL) Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.47.15 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Microsoft Windows Server 2008 R2 Member Server Level 1 v3.3.1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.47.15 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Microsoft Windows Server 2008 Member Server Level 1 v3.3.1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.47.16 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.95.1 Ensure 'Turn on PowerShell Script Block Logging' is set to 'Disabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT

18.10.42.17 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.17 Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.17 Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Microsoft Windows Server 2022 STIG v2.0.0 L1 Domain ControllerWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.42.17 Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 DCWindows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.16 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Windows Server 2012 DC L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.10.43.16 (L1) Ensure 'Turn off Microsoft Defender AntiVirus' is set to 'Disabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Java permissions - Trusted Sites ZoneMSCT Windows 10 v20H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Lock pages in memoryMSCT Windows 10 v20H2 v1.0.0Windows

ACCESS CONTROL