Item Search

NameAudit NamePluginCategory
2.2.20 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)CIS Windows Server 2012 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.20 (L1) Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

ACCESS CONTROL

2.2.22 Ensure 'Deny access to this computer from the network' to include 'Guests' (DC only)CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 DCWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.23 Ensure 'Deny access to this computer from the network' to include 'Guests, Local account and member of Administrators group' (MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 L1 MSWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2.44 Ensure 'Synchronize directory service data' is set to 'No One' (DC only) - No One (DC only)CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2008 R2 DB Engine L1 v1.7.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

ACCESS CONTROL

4.2 Ensure 'CHECK_EXPIRATION' Option is set to 'ON' for All SQL Authenticated Logins Within the Sysadmin RoleCIS Microsoft SQL Server 2019 v1.5.0 L1 Database EngineMS_SQLDB

ACCESS CONTROL

8.4.26 Ensure all but VGA mode on virtual machines is disabledCIS VMware ESXi 6.7 v1.3.0 Level 2VMware

CONFIGURATION MANAGEMENT

17.2.3 Ensure 'Audit Other Account Management Events' is set to include 'Success' (DC only) - Success (DC only)CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

AUDIT AND ACCOUNTABILITY

18.8.52.1.2 Ensure 'Enable Windows NTP Server' is set to 'Disabled'CIS Windows 7 Workstation Level 2 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.8.52.1.2 Ensure 'Enable Windows NTP Server' is set to 'Disabled'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.102.6 Ensure 'No auto-restart with logged on users for scheduled automatic updates installations' is set to 'Disabled'CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

SYSTEM AND INFORMATION INTEGRITY

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows 10 1803 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows 10 1903 v1.19.9Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server v1909 MS v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server v20H2 MS v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server 2016 MS v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT MSCT Windows Server 2022 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server v20H2 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server 1903 MS v1.19.9Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server v1909 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows Server 2019 DC v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows 10 v21H2 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

Network security: Do not store LAN Manager hash value on next password changeMSCT Windows 11 v23H2 v1.0.0Windows

IDENTIFICATION AND AUTHENTICATION

WDNS-SI-000001 - The Windows 2012 DNS Server must be configured to only allow zone information that reflects the environment for which it is authoritative, to include IP ranges and IP versions.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

SYSTEM AND INFORMATION INTEGRITY

WN10-00-000170 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.DISA Microsoft Windows 10 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN11-00-000170 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.DISA Microsoft Windows 11 STIG v2r3Windows

CONFIGURATION MANAGEMENT

WN11-UR-000085 - The 'Deny log on locally' user right on workstations must be configured to prevent access from highly privileged domain accounts on domain systems and unauthenticated access on all systems.DISA Microsoft Windows 11 STIG v2r3Windows

ACCESS CONTROL

WN16-00-000412 - The Server Message Block (SMB) v1 protocol must be disabled on the SMB client.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN16-AC-000080 - Windows Server 2016 must have the built-in Windows password complexity policy enabled.DISA Microsoft Windows Server 2016 STIG v2r10Windows

IDENTIFICATION AND AUTHENTICATION

WN16-CC-000040 - Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2016 STIG v2r10Windows

CONFIGURATION MANAGEMENT

WN19-00-000200 - Windows Server 2019 accounts must require passwords.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN19-00-000400 - Windows Server 2019 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN19-AC-000080 - Windows Server 2019 must have the built-in Windows password complexity policy enabled.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN19-CC-000030 - Windows Server 2019 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN19-CC-000040 - Windows Server 2019 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN19-CC-000470 - Windows Server 2019 Windows Remote Management (WinRM) client must not use Basic authentication.DISA Microsoft Windows Server 2019 STIG v3r4Windows

MAINTENANCE

WN19-CC-000480 - Windows Server 2019 Windows Remote Management (WinRM) client must not allow unencrypted traffic.DISA Microsoft Windows Server 2019 STIG v3r4Windows

MAINTENANCE

WN19-CC-000500 - Windows Server 2019 Windows Remote Management (WinRM) service must not use Basic authentication.DISA Microsoft Windows Server 2019 STIG v3r4Windows

MAINTENANCE

WN19-CC-000510 - Windows Server 2019 Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Microsoft Windows Server 2019 STIG v3r4Windows

MAINTENANCE

WN19-CC-000520 - Windows Server 2019 Windows Remote Management (WinRM) service must not store RunAs credentials.DISA Microsoft Windows Server 2019 STIG v3r4Windows

IDENTIFICATION AND AUTHENTICATION

WN22-00-000400 - Windows Server 2022 must have the Server Message Block (SMB) v1 protocol disabled on the SMB client.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000030 - Windows Server 2022 Internet Protocol version 6 (IPv6) source routing must be configured to the highest protection level to prevent IP source routing.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000040 - Windows Server 2022 source routing must be configured to the highest protection level to prevent Internet Protocol (IP) source routing.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT

WN22-CC-000470 - Windows Server 2022 Windows Remote Management (WinRM) client must not use Basic authentication.DISA Microsoft Windows Server 2022 STIG v2r4Windows

MAINTENANCE

WN22-CC-000480 - Windows Server 2022 Windows Remote Management (WinRM) client must not allow unencrypted traffic.DISA Microsoft Windows Server 2022 STIG v2r4Windows

MAINTENANCE

WN22-CC-000490 - Windows Server 2022 Windows Remote Management (WinRM) client must not use Digest authentication.DISA Microsoft Windows Server 2022 STIG v2r4Windows

MAINTENANCE

WN22-CC-000510 - Windows Server 2022 Windows Remote Management (WinRM) service must not allow unencrypted traffic.DISA Microsoft Windows Server 2022 STIG v2r4Windows

MAINTENANCE

WN22-CC-000520 - Windows Server 2022 Windows Remote Management (WinRM) service must not store RunAs credentials.DISA Microsoft Windows Server 2022 STIG v2r4Windows

IDENTIFICATION AND AUTHENTICATION