Item Search

NameAudit NamePluginCategory
5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.1 Ensure that WildFire file size upload limits are maximizedCIS Palo Alto Firewall 11 v1.1.0 L1Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

18.9.11.1.3 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

ACCESS CONTROL, CONTINGENCY PLANNING

18.9.11.1.9 (BL) Ensure 'Choose how BitLocker-protected fixed drives can be recovered: Do not enable BitLocker until recovery information is stored to AD DS for fixed data drives' is set to 'Enabled: False'CIS Microsoft Windows 8.1 v2.4.1 L2 BitlockerWindows

ACCESS CONTROL, CONTINGENCY PLANNING

18.9.11.1.11 Ensure 'Configure use of smart cards on fixed data drives' is set to 'Enabled'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.11.1.15 (BL) Ensure 'Configure use of smart cards on fixed data drives' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.11.2.11 Ensure 'Require additional authentication at startup' is set to 'Enabled'CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0Windows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.11.3.3 (BL) Ensure 'Choose how BitLocker-protected removable drives can be recovered: Allow data recovery agent' is set to 'Enabled: True'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

ACCESS CONTROL, CONTINGENCY PLANNING

18.9.11.3.15 (BL) Ensure 'Configure use of smart cards on removable data drives' is set to 'Enabled'CIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

IDENTIFICATION AND AUTHENTICATION, SYSTEM AND COMMUNICATIONS PROTECTION

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - INFOPATH.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaw.exeCIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - LYNC.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OIS.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OUTLOOK.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - PPTVIEW.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VISIO.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VPREVIEW.EXECIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 (L1) Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - wordpad.exeCIS Microsoft Windows 8.1 v2.4.1 L1 BitlockerWindows

SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - INFOPATH.exeCIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - javaws.exeCIS Windows 7 Workstation Level 1 v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - LYNC.exeCIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - OUTLOOK.exeCIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.9.24.5 Ensure 'Default Protections for Recommended Software' is set to 'Enabled' - VISIO.EXECIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0Windows

CONFIGURATION MANAGEMENT

18.10.9.3.14 (L1) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v3.0.0 L1Windows

MEDIA PROTECTION

18.10.10.3.11 (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled'CIS Microsoft Windows 11 Stand-alone v4.0.0 BLWindows

MEDIA PROTECTION

18.10.10.3.11 (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 BLWindows

MEDIA PROTECTION

18.10.10.3.11 (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v4.0.0 L1 BLWindows

MEDIA PROTECTION

18.10.10.3.14 (BL) Ensure 'Deny write access to removable drives not protected by BitLocker' is set to 'Enabled'CIS Microsoft Windows 11 Enterprise v4.0.0 BitLockerWindows

MEDIA PROTECTION

ESXI-70-000001 - Access to the ESXi host must be limited by enabling lockdown mode.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

ACCESS CONTROL

ESXI-70-000002 - The ESXi host must verify the DCUI.Access list.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000038 - ESXi hosts using Host Profiles and/or Auto Deploy must use the vSphere Authentication Proxy to protect passwords when adding themselves to Active Directory.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

IDENTIFICATION AND AUTHENTICATION

ESXI-70-000049 - The ESXi host must protect the confidentiality and integrity of transmitted information by protecting ESXi management traffic.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000054 - The ESXi host must enable bidirectional Challenge-Handshake Authentication Protocol (CHAP) authentication for Internet Small Computer Systems Interface (iSCSI) traffic.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000063 - All port groups on standard switches must be configured to a value other than that of the native virtual local area network (VLAN).DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000064 - All port groups on standard switches must not be configured to virtual local area network (VLAN) 4095 unless Virtual Guest Tagging (VGT) is required.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000070 - The ESXi host must not provide root/administrator-level access to Common Information Model (CIM)-based hardware monitoring tools or other third-party applications.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000079 - The ESXi host must not suppress warnings that the local or remote shell sessions are enabled.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000087 - The ESXi host must enable volatile key destruction.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

ESXI-70-000089 - The ESXi Host Client must be configured with a session timeout.DISA STIG VMware vSphere 7.0 ESXi v1r4VMware

CONFIGURATION MANAGEMENT

KNOX-07-900300 - The Samsung must be configured to not allow Container passwords with more than two repeating or sequential characters.AirWatch - DISA Samsung Android 7 with Knox 2.x v1r1MDM

CONFIGURATION MANAGEMENT

VCTR-67-000023 - The vCenter Server must configure the vpxuser auto-password to be changed every 30 days.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000031 - The vCenter Server must restrict the connectivity between Update Manager and public patch repositories by use of a separate Update Manager Download Server.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000034 - The vCenter Server must use unique service accounts when applications connect to vCenter.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000051 - The vCenter Server users must have the correct roles assigned.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000057 - The vCenter Server must enable TLS 1.2 exclusively.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000063 - The vCenter Server must restrict access to the cryptographic role.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000068 - The vCenter Server must use secure Lightweight Directory Access Protocol (LDAPS) when adding an SSO identity source.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCTR-67-000999 - The version of vCenter running on the system must be a supported version.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND INFORMATION INTEGRITY

WBLC-05-000162 - Oracle WebLogic must enforce password complexity by the number of upper-case characters used.Oracle WebLogic Server 12c Linux v2r2 MiddlewareUnix

IDENTIFICATION AND AUTHENTICATION

WBLC-05-000165 - Oracle WebLogic must enforce password complexity by the number of special characters used.Oracle WebLogic Server 12c Linux v2r2Unix

IDENTIFICATION AND AUTHENTICATION