Item Search

NameAudit NamePluginCategory
2.2 Set 'Specify use of ActiveX Installer Service for installation of ActiveX controls' to 'Enabled'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Set 'Turn on ActiveX Filtering' to 'Enabled'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.4 Set 'Turn off ActiveX opt-in prompt' to 'Disabled'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

2.11.20 - Permissions and Ownership - 'home directory permissions do not allow group or world write'CIS AIX 5.3/6.1 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.17 Secure permissions for the primary archive log location - LOGARCHMETH1 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.18 Secure permissions for the secondary archive log location - LOGARCHMETH2 OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 1Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.1.20 Secure permissions for the log mirror location - MIRRORLOGPATH OS PermissionsCIS IBM DB2 v10 v1.1.0 Windows OS Level 2Windows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.4 Secure permissions for the primary archive log location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.5 Secure permissions for the secondary archive log location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.7 Secure permissions for the log mirror location - FILE_PERMISSIONSCIS IBM DB2 9 Benchmark v3.0.1 Level 1 OS WindowsWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

3.2.12 Set archive log failover retry limit - 'numarchretry <= 5'CIS IBM DB2 OS L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.03 Files in $ORACLE_HOME (not including $ORACLE_HOME/bin) - 'Permissions set to 0750 or less on Unix Systems'CIS v1.1.0 Oracle 11g OS L1Unix

CONFIGURATION MANAGEMENT

3.6 Configure 'Allow deleting browsing history on exit'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

4.32 init.ora - 'db_securefile = ALWAYS'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

CONFIGURATION MANAGEMENT

5.15 OAS - 'SSL Client DN Match - Set tnsnames file to include ssl_server_cert_dn parameter with the DN of the certificate'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

CONFIGURATION MANAGEMENT

5.26 sqlnet.ora - 'ssl_server_dn_match = YES'CIS v1.1.0 Oracle 11g OS Windows Level 2Windows

CONFIGURATION MANAGEMENT

6.2 Configure 'Turn off URL Suggestions'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

6.3 Configure 'Prevent participation in the Customer Experience Improvement Program'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

6.9 Ensure that PAN-DB URL Filtering is usedCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.10 Ensure that URL Filtering uses the action of block or override on the URL categoriesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.13 Ensure secure URL filtering is enabled for all security policies allowing traffic to the InternetCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

8.2.3 Set 'Intranet Sites: Include all network paths (UNCs)' to 'Disabled'CIS IE 10 v1.1.0Windows

CONFIGURATION MANAGEMENT

8.8 User Home Directories Should Be Mode 750 or More RestrictiveCIS Solaris 9 v1.3Unix

CONFIGURATION MANAGEMENT

8.9 Set 'mesg n' as the default for all users (/etc/csh.login)CIS FreeBSD v1.0.5Unix

CONFIGURATION MANAGEMENT

Big Sur - Prevent the Use of Dictionary Words for PasswordsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT

Catalina - Prevent the Use of Dictionary Words for PasswordsNIST macOS Catalina v1.5.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT

Fortigate - SNMP v3 auth-priv is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Fortigate - SNMP v3 is not enabledTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION

Logs containing auditing information should be secured at the directory level.TNS IBM HTTP Server Best PracticeWindows

AUDIT AND ACCOUNTABILITY, CONFIGURATION MANAGEMENT

Monterey - Disable Password HintsNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Password HintsNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Password HintsNIST macOS Monterey v1.0.0 - 800-53r5 LowUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Password HintsNIST macOS Monterey v1.0.0 - 800-171Unix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Monterey - Disable Password HintsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

CONFIGURATION MANAGEMENT, IDENTIFICATION AND AUTHENTICATION

Monterey - Enable Firmware PasswordNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Enable Firmware PasswordNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Integrate System into a Directory Services InfrastructureNIST macOS Monterey v1.0.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT

Monterey - Must Use an Approved Antivirus ProgramNIST macOS Monterey v1.0.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

Monterey - Prevent the Use of Dictionary Words for PasswordsNIST macOS Monterey v1.0.0 - All ProfilesUnix

CONFIGURATION MANAGEMENT

Monterey - Secure User's Home FoldersNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Secure User's Home FoldersNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Secure User's Home FoldersNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Secure User's Home FoldersNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

Monterey - Secure User's Home FoldersNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

MSS: (SafeDLLSearchMode) Enable safe DLL search mode (Recommended)MSCT Windows Server 2012 R2 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

MSS: (SafeDLLSearchMode) Enable safe DLL search mode (Recommended)MSCT Windows Server 2012 R2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

XAPI SSL certificate is in default locationTNS Citrix HypervisorUnix

CONFIGURATION MANAGEMENT