Item Search

NameAudit NamePluginCategory
2.2 Ensure the SharePoint farm service account (database access account) is configured with the minimum privileges for the local server.CIS Microsoft SharePoint 2016 OS v1.1.0Windows

ACCESS CONTROL

2.2 Ensure the SharePoint farm service account (database access account) is configured with the minimum privileges for the local server.CIS Microsoft SharePoint 2019 OS v1.0.0Windows

ACCESS CONTROL

2.2.3 (L1) Ensure 'Access this computer from the network' is set to 'Administrators, Authenticated Users' (MS only)CIS Microsoft Windows Server 2025 v1.0.0 L1 MSWindows

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

IDENTIFICATION AND AUTHENTICATION

2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.8.1 Ensure 'Microsoft network client: Digitally sign communications (always)' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT

2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

IDENTIFICATION AND AUTHENTICATION

2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

IDENTIFICATION AND AUTHENTICATION

2.3.9.3 Ensure 'Microsoft network server: Digitally sign communications (if client agrees)' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1Windows

CONFIGURATION MANAGEMENT

2.5 Ensure that the User-ID Agent has minimal permissions if User-ID is enabledCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

2.5 Ensure that the User-ID Agent has minimal permissions if User-ID is enabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

5.2 (L2) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2022 v4.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

5.2 (L2) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

5.2 (L2) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Windows Server 2012 MS L2 v3.0.0Windows

CONFIGURATION MANAGEMENT

5.2 (L2) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2019 v3.0.1 L2 MSWindows

CONFIGURATION MANAGEMENT

5.2 (L2) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2025 v1.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

5.2 (L2) Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2008 R2 Member Server Level 2 v3.3.1Windows

CONFIGURATION MANAGEMENT

5.4 Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

5.4 Ensure 'Print Spooler (Spooler)' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2019 STIG v3.0.0 L2 MSWindows

CONFIGURATION MANAGEMENT

18.3.1 Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)' - Enabled: Disable driver (recommended)CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 DCWindows

CONFIGURATION MANAGEMENT

18.3.1 Ensure 'Configure SMB v1 client driver' is set to 'Enabled: Disable driver (recommended)' - Enabled: Disable driver (recommended)CIS Azure Compute Microsoft Windows Server 2022 v1.0.0 L1 MSWindows

CONFIGURATION MANAGEMENT

18.9.25.3 (L1) Ensure 'Enable password encryption' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BLWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.25.3 (L1) Ensure 'Enable password encryption' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 L1 BitLockerWindows

ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.51.1.2 (L1) Ensure 'Enable Windows NTP Server' is set to 'Disabled'CIS Microsoft Windows 10 Enterprise v4.0.0 L1 BL NGWindows

AUDIT AND ACCOUNTABILITY

18.9.51.1.2 (L1) Ensure 'Enable Windows NTP Server' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 v3.0.0 L1 MSWindows

AUDIT AND ACCOUNTABILITY

18.9.51.1.2 (L1) Ensure 'Enable Windows NTP Server' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2022 v4.0.0 L1 MSWindows

AUDIT AND ACCOUNTABILITY

18.9.51.1.3 Ensure 'Enable Windows NTP Server' is set to 'Disabled' (MS only)CIS Microsoft Windows Server 2016 STIG v3.0.0 L1 MSWindows

AUDIT AND ACCOUNTABILITY

CIS_Microsoft_SQL_Server_2012_Database_v1.6.0_Level_1_OS.audit from Microsoft SQL Server 2012 Database, version 1.6.0CIS SQL Server 2012 Database L1 OS v1.6.0Windows
IIST-SV-000103 - Both the log file and Event Tracing for Windows (ETW) for the IIS 10.0 web server must be enabled.DISA IIS 10.0 Server v2r10Windows

AUDIT AND ACCOUNTABILITY

IIST-SV-000103 - Both the log file and Event Tracing for Windows (ETW) for the IIS 10.0 web server must be enabled.DISA IIS 10.0 Server v3r3Windows

AUDIT AND ACCOUNTABILITY

IISW-SV-000103 - Both the log file and Event Tracing for Windows (ETW) for the IIS 8.5 web server must be enabled.DISA IIS 8.5 Server v2r7Windows

AUDIT AND ACCOUNTABILITY

JBOS-AS-000470 - Network access to HTTP management must be disabled on domain-enabled application servers not designated as the domain controller.DISA JBoss EAP 6.3 STIG v2r6Unix

ACCESS CONTROL

Network access: Remotely accessible registry paths and subpathsMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Network access: Remotely accessible registry paths and subpathsMSCT Windows Server 2012 R2 DC v1.0.0Windows

ACCESS CONTROL

WDNS-CM-000020 - The Windows 2012 DNS Servers zone database files must not be accessible for edit/write by users and/or processes other than the Windows 2012 DNS Server service account and/or the DNS database administrator.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

CONFIGURATION MANAGEMENT

WDNS-IA-000001 - The Windows 2012 DNS Server must require devices to re-authenticate for each dynamic update request connection attempt.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

IDENTIFICATION AND AUTHENTICATION

WDNS-IA-000006 - The Windows 2012 DNS Server must be configured to enforce authorized access to the corresponding private key.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

IDENTIFICATION AND AUTHENTICATION

WDNS-SC-000003 - The Windows 2012 DNS Servers IP address must be statically defined and configured locally on the server.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SC-000004 - The Windows 2012 DNS Server must return data information in responses to internal name/address resolution queries.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SC-000005 - The Windows 2012 DNS Server must use DNSSEC data within queries to confirm data origin to DNS resolvers.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SC-000007 - The Windows 2012 DNS Server must use DNSSEC data within queries to confirm data integrity to DNS resolvers.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SC-000027 - The Windows 2012 DNS Server must use DNS Notify to prevent denial of service through increase in workload.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WDNS-SI-000002 - The Windows 2012 DNS Server must follow procedures to re-role a secondary name server as the master name server should the master name server permanently lose functionality.DISA Microsoft Windows 2012 Server DNS STIG v2r7Windows

SYSTEM AND INFORMATION INTEGRITY

WN12-GE-000004-MS - Only administrators responsible for the member server must have Administrator rights on the system.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

ACCESS CONTROL

WN12-GE-000010 - The system must not boot into multiple operating systems (dual-boot).DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

CONFIGURATION MANAGEMENT

WN16-MS-000010 - Only administrators responsible for the member server or standalone or nondomain-joined system must have Administrator rights on the system.DISA Microsoft Windows Server 2016 STIG v2r10Windows

ACCESS CONTROL

WN19-MS-000010 - Windows Server 2019 must only allow Administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system.DISA Microsoft Windows Server 2019 STIG v3r4Windows

ACCESS CONTROL

WN19-MS-000030 - Windows Server 2019 local users on domain-joined member servers must not be enumerated.DISA Microsoft Windows Server 2019 STIG v3r4Windows

CONFIGURATION MANAGEMENT

WN22-MS-000010 - Windows Server 2022 must only allow administrators responsible for the member server or standalone or nondomain-joined system to have Administrator rights on the system.DISA Microsoft Windows Server 2022 STIG v2r4Windows

ACCESS CONTROL

WN22-MS-000030 - Windows Server 2022 local users on domain-joined member servers must not be enumerated.DISA Microsoft Windows Server 2022 STIG v2r4Windows

CONFIGURATION MANAGEMENT