Item Search

NameAudit NamePluginCategory
1.10.11 Ensure 'logging trap severity ' is greater than or equal to '5'Tenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

2.2.1.5 Ensure 'Allow personalized ads delivered by Apple' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.5 Ensure 'Allow personalized ads delivered by Apple' is set to 'Disabled'AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.5 Ensure 'Allow personalized ads delivered by Apple' is set to 'Disabled'MobileIron - CIS Apple iOS 17 v1.1.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT

2.2.1.13 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'MobileIron - CIS Apple iOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.13 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'AirWatch - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.13 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

2.2.1.13 Ensure 'Force Apple Watch wrist detection' is set to 'Enabled'AirWatch - CIS Apple iOS 17 Benchmark v1.1.0 End User Owned L1MDM

ACCESS CONTROL, MEDIA PROTECTION

2.14.1 Audit Game Center SettingsCIS Apple macOS 15.0 Sequoia v1.0.0 L2Unix

CONFIGURATION MANAGEMENT

2.14.1 Audit Game Center SettingsCIS Apple macOS 13.0 Ventura v3.0.0 L2Unix

CONFIGURATION MANAGEMENT

2.14.1 Audit Game Center SettingsCIS Apple macOS 14.0 Sonoma v2.0.0 L2Unix

CONFIGURATION MANAGEMENT

3 - Audit Logging - LoggerTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

3.2.1.25 Ensure 'Allow sending diagnostic and usage data to Apple' is set to 'Disabled'MobileIron - CIS Apple iPadOS 17 v1.1.0 End User Owned L1MDM

CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION

4 - Send logs to a remote serverTNS Best Practice JBoss 7 LinuxUnix

AUDIT AND ACCOUNTABILITY

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databases - greater than or equal to 2048 in non-system databasesCIS SQL Server 2014 Database L1 AWS RDS v1.5.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to 'greater than or equal to 2048' in non-system databases - greater than or equal to 2048 in non-system databasesCIS SQL Server 2014 Database L1 DB v1.5.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to' greater than or equal to 2048' in non-system databasesCIS SQL Server 2012 Database L1 DB v1.6.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

7.2 Ensure Asymmetric Key Size is set to' greater than or equal to 2048' in non-system databasesCIS SQL Server 2012 Database L1 AWS RDS v1.6.0MS_SQLDB

SYSTEM AND COMMUNICATIONS PROTECTION

Alertmail server not configured or this feature is not available on the deviceTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND INFORMATION INTEGRITY

Auto Backup via central management is not available or not configured.TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONTINGENCY PLANNING

CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.1.0CIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L1Unix
CIS_Apple_macOS_12.0_Monterey_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 12.0 Monterey Cloud-tailored Benchmark v1.1.0CIS Apple macOS 12.0 Monterey Cloud-tailored v1.1.0 L2Unix
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.1.0CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L1Unix
CIS_Apple_macOS_13.0_Ventura_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 13.0 Ventura Cloud-tailored Benchmark v1.1.0CIS Apple macOS 13.0 Ventura Cloud-tailored v1.1.0 L2Unix
CIS_Apple_macOS_14.0_Sonoma_Cloud-tailored_v1.1.0_L1.audit from CIS Apple macOS 14.0 Sonoma Cloud-tailored Benchmark v1.1.0CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L1Unix
CIS_Apple_macOS_14.0_Sonoma_Cloud-tailored_v1.1.0_L2.audit from CIS Apple macOS 14.0 Sonoma Cloud-tailored Benchmark v1.1.0CIS Apple macOS 14.0 Sonoma Cloud-tailored v1.1.0 L2Unix
Ensure 'EIGRP authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'HTTP session timeout' is less than or equal to '5' minutesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure 'logging buffered severity ' is greater than or equal to '3'Tenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'logging with timestamps' is enabledTenable Cisco Firepower Best Practices AuditCisco

AUDIT AND ACCOUNTABILITY

Ensure 'RIP authentication' is enabledTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - authenticationTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkdownTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'SNMP traps' is enabled - linkupTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure 'TLS 1.0' is set for HTTPS accessTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure DHCP services are disabled for untrusted interfaces - dhcpdTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure DNS services are configured correctly - name-serverTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND COMMUNICATIONS PROTECTION

Ensure email logging is configured for critical to emergencyTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure ICMP is restricted for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Ensure known default accounts do not existTenable Cisco Firepower Best Practices AuditCisco

IDENTIFICATION AND AUTHENTICATION

Ensure packet fragments are restricted for untrusted interfacesTenable Cisco Firepower Best Practices AuditCisco

CONFIGURATION MANAGEMENT

Fortigate - AAA - LDAP server is trustedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - AAA - RADIUS server is trustedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - AAA - TACACS+ server is trustedTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION

Fortigate - Review the patch update methodTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

SYSTEM AND INFORMATION INTEGRITY

Fortigate - Review users with admin privilegesTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

Fortigate - SNMP v3 auth-priv is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - SNMP v3 is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

SNMP is not enabled. SNMP specific checks not performed.TNS Fortigate FortiOS Best Practices v2.0.0FortiGate

IDENTIFICATION AND AUTHENTICATION