2.1.2.4 Ensure IM groups is set to enabled | CIS Zoom L2 v1.0.0 | Zoom | CONFIGURATION MANAGEMENT |
2.4 Do Not Specify Passwords in the Command Line | CIS MySQL 8.0 Community Linux OS L1 v1.1.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
2.4 Do Not Specify Passwords in the Command Line | CIS Oracle MySQL Enterprise Edition 8.4 v1.0.0 L1 MySQL OS Linux | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.1.7 Ensure ufw default deny firewall policy | CIS Debian 10 Workstation L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.4.1.7 Ensure ufw default deny firewall policy | CIS Debian 10 Server L1 v2.0.0 | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
3.6.1.1 OpenSSH - Installation | CIS IBM AIX 7.1 L1 v2.1.0 | Unix | CONFIGURATION MANAGEMENT, MAINTENANCE |
4.2.7 Ensure ufw default deny firewall policy | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.2.7 Ensure ufw default deny firewall policy | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.2.8 Ensure ufw default deny firewall policy | CIS Ubuntu Linux 20.04 LTS v3.0.0 L1 Server | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.2.8 Ensure ufw default deny firewall policy | CIS Ubuntu Linux 20.04 LTS v3.0.0 L1 Workstation | Unix | SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION |
4.5 Ensure the Exception Users list is properly configured | CIS VMware ESXi 6.5 v1.0.0 Level 1 | VMware | ACCESS CONTROL |
4.20 sqlnet.ora - 'tcp.validnode_checking = YES' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
5.1 Do Not Specify Passwords in the Command Line | CIS PostgreSQL 14 OS v 1.2.0 | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
5.1 Do Not Specify Passwords in the Command Line | CIS PostgreSQL 17 v1.0.0 L1 PostgreSQL | Unix | ACCESS CONTROL, IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION |
12.55 Passwords - 'Remove password parameters from configuration files utilized for Silent Installations' | CIS v1.1.0 Oracle 11g OS L2 | Unix | |
20.59 Ensure 'Software certificate installation files must be removed' (STIG only) | CIS Microsoft Windows Server 2022 STIG v2.0.0 STIG DC | Windows | CONFIGURATION MANAGEMENT |
AOSX-14-000015 - The macOS system must utilize an HBSS solution and implement all DoD required modules. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | SYSTEM AND INFORMATION INTEGRITY |
APPL-12-000015 - The macOS system must utilize an ESS solution and implement all DoD required modules - ESS and implement all DoD required modules. | DISA STIG Apple macOS 12 v1r9 | Unix | SYSTEM AND INFORMATION INTEGRITY |
APPL-13-000015 - The macOS system must use an Endpoint Security Solution (ESS) and implement all DOD required modules. | DISA STIG Apple macOS 13 v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisEnabled | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAM137 - McAfee VirusScan On-Access General Policies Artemis sensitivity level must be configured to medium or higher - ArtemisLevel | DISA McAfee VirusScan 8.8 Managed Client STIG v6r1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
DTAVSEL-005 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown program viruses. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
DTAVSEL-006 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to find unknown macro viruses. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
DTAVSEL-008 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to scan files when being written to disk. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
DTAVSEL-009 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be configured to scan files when being read from disk. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
DTAVSEL-019 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must be enabled to scan mounted volumes when mounted volumes point to a network server without an anti-virus solution installed. | McAfee Virus Scan Enterprise for Linux 1.9x/2.0x Managed Client v1r5 | Unix | SYSTEM AND INFORMATION INTEGRITY |
Prevent installation of devices that match any of these device IDs - 1 | MSCT Windows 10 v1507 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - 1 | MSCT Windows 10 1903 v1.19.9 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - DenyDeviceIDs | MSCT Windows 10 v1507 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - DenyDeviceIDs | MSCT Windows 10 1903 v1.19.9 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactive | MSCT Windows 10 v1507 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactive | MSCT Windows 10 1803 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactive | MSCT Windows 10 1809 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - DenyDeviceIDsRetroactive | MSCT Windows 10 1903 v1.19.9 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - Device Installation Restrictions | MSCT Windows 10 1809 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices that match any of these device IDs - PCI\CC_0C0A | MSCT Windows 10 1803 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - {d48179be-ec20-11d1-b6b8-00c04fa372a7} | MSCT Windows 10 1803 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - 1 | MSCT Windows 10 v1507 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - 1 | MSCT Windows 10 v21H2 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClasses | MSCT Windows 10 v1507 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClasses | MSCT Windows 10 1803 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClassesRetroactive | MSCT Windows 10 1803 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClassesRetroactive | MSCT Windows 10 1809 v1.0.0 | Windows | MEDIA PROTECTION |
Prevent installation of devices using drivers that match these device setup classes - DenyDeviceClassesRetroactive | MSCT Windows 10 v21H2 v1.0.0 | Windows | MEDIA PROTECTION |
VCTR-67-000033 - The vCenter Server must use a least-privileges assignment for the vCenter Server database user. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | CONFIGURATION MANAGEMENT |
VCTR-67-000074 - The vCenter Server Administrators must clean up log files after failed installations. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | CONFIGURATION MANAGEMENT |
VCWN-06-000033 - A least-privileges assignment must be used for the vCenter Server database user. | DISA STIG VMware vSphere vCenter 6.x v1r4 | VMware | CONFIGURATION MANAGEMENT |
VCWN-65-000028 - The vCenter Server for Windows Administrators must clean up log files after failed installations. | DISA STIG VMware vSphere vCenter 6.5 v2r3 | VMware | CONFIGURATION MANAGEMENT |
VCWN-65-000033 - The vCenter Server for Windows must use a least-privileges assignment for the vCenter Server database user. | DISA STIG VMware vSphere vCenter 6.5 v2r3 | VMware | CONFIGURATION MANAGEMENT |
VM Tools: guest-8.tools-allow-transforms | VMware vSphere Security Configuration and Hardening Guide | VMware | CONFIGURATION MANAGEMENT |