Item Search

NameAudit NamePluginCategory
1.1.4 Set 'login authentication for 'line con 0'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.1.5 Set 'login authentication for 'line tty'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.1.6 Set 'login authentication for 'line vty'CIS Cisco IOS 15 L1 v4.1.1Cisco

ACCESS CONTROL

1.5.3 Configure Netflow on Strategic PortsCIS Cisco NX-OS v1.2.0 L2Cisco

AUDIT AND ACCOUNTABILITY, INCIDENT RESPONSE, SYSTEM AND INFORMATION INTEGRITY

1.9.2 Configure SNMP TrapsCIS Cisco NX-OS v1.2.0 L1Cisco

SYSTEM AND INFORMATION INTEGRITY

3.2.1.1 Configure RA GuardCIS Cisco NX-OS v1.2.0 L1Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

7.2.1 Ensure that port groups are not configured to the value of the native VLANCIS VMware ESXi 5.1 v1.0.1 Level 1VMware
7.4 Ensure that port groups are not configured to the value of the native VLANCIS VMware ESXi 5.5 v1.2.0 Level 1VMware
7.5 (L1) Ensure port groups are not configured to VLAN values reserved by upstream physical switchesCIS VMware ESXi 7.0 v1.5.0 L1VMware

SECURITY ASSESSMENT AND AUTHORIZATION, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-100001 - The macOS system must be a supported release.DISA STIG Apple Mac OSX 10.15 v1r10Unix

CONFIGURATION MANAGEMENT

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA STIG Arista MLS EOS 4.2x L2S v2r1Arista

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-L2-000220 - The Arista MLS layer 2 switch must have the native VLAN assigned to an ID other than the default VLAN for all 802.1q trunk links.DISA Arista MLS EOS 4.X L2S STIG v2r3Arista

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000110 - The Cisco switch must have STP Loop Guard enabled.DISA Cisco IOS XE Switch L2S STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000110 - The Cisco switch must have STP Loop Guard enabled.DISA Cisco NX OS Switch L2S STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000210 - The Cisco switch must have all disabled switch ports assigned to an unused VLAN.DISA Cisco IOS XE Switch L2S STIG v3r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-L2-000210 - The Cisco switch must have all disabled switch ports assigned to an unused VLAN.DISA Cisco NX OS Switch L2S STIG v3r3Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000150 - The Cisco switch must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must disconnect the session.DISA Cisco NX OS Switch NDM STIG v3r6Cisco

ACCESS CONTROL

CISC-ND-001310 - The Cisco switch must be configured to off-load log records onto a different system than the system being audited.DISA Cisco NX OS Switch NDM STIG v3r6Cisco

AUDIT AND ACCOUNTABILITY

CISC-RT-000235 - The Cisco switch must be configured to have Cisco Express Forwarding enabled.DISA Cisco IOS XE Switch RTR STIG v3r3Cisco

CONFIGURATION MANAGEMENT

CISC-RT-000235 - The Cisco switch must be configured to have Cisco Express Forwarding enabled.DISA Cisco IOS Switch RTR STIG v3r2Cisco

CONFIGURATION MANAGEMENT

DISA_IIS_8.5_Web_Server_v2r7.audit from DISA Microsoft IIS 8.5 Server v2r7 STIGDISA IIS 8.5 Server v2r7Windows
DISA_IIS_8.5_Web_Site_v2r9.audit from DISA Microsoft IIS 8.5 Site v2r9 STIGDISA IIS 8.5 Site v2r9Windows
DISA_Oracle_11g_Installation_v9r1_OS_Linux.audit from DISA Oracle Database 11g Installation STIG v9r1 STIGDISA STIG Oracle 11 Installation v9r1 LinuxUnix
DISA_Oracle_11g_Installation_v9r1_OS_Windows.audit from DISA Oracle Database 11g Installation STIG v9r1 STIGDISA STIG Oracle 11 Installation v9r1 WindowsWindows
DISA_Oracle_11g_Instance_v9r1_OS_Linux.audit from DISA Oracle Database 11g Instance STIG v9r1 STIGDISA STIG Oracle 11 Instance v9r1 OS UnixUnix
DISA_Oracle_11g_Instance_v9r1_OS_Windows.audit from DISA Oracle Database 11g Instance STIG v9r1 STIGDISA STIG Oracle 11 Instance v9r1 OS WindowsWindows
DISA_STIG_Cisco_ASA_FW_v2r1.audit from DISA Cisco ASA Firewall v2r1 STIGDISA STIG Cisco ASA FW v2r1Cisco
DISA_STIG_Cisco_ASA_NDM_v2r4.audit from DISA Cisco ASA NDM v2r4 STIGDISA STIG Cisco ASA NDM v2r4Cisco
DISA_STIG_Cisco_ASA_VPN_v2r2.audit from DISA Cisco ASA VPN v2r2 STIGDISA STIG Cisco ASA VPN v2r2Cisco
DISA_STIG_MSSQL_2012_Database_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIGDISA STIG SQL Server 2012 Database Audit v1r20MS_SQLDB
DISA_STIG_MSSQL_2012_Instance-DB_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIGDISA STIG SQL Server 2012 DB Instance Security v1r20MS_SQLDB
DISA_STIG_MSSQL_2012_Instance-OS_v1r20.audit from DISA Microsoft SQL Server Instance 2012 v1r20 STIGDISA STIG SQL Server 2012 Database OS Audit v1r20Windows
ESXI-06-000063 - All port groups must be configured to a value other than that of the native VLAN.DISA VMware vSphere ESXi 6.0 STIG v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-06-000065 - All port groups must not be configured to VLAN values reserved by upstream physical switches.DISA VMware vSphere ESXi 6.0 STIG v1r5VMware

CONFIGURATION MANAGEMENT

ESXI-65-000063 - For the ESXi host all port groups must be configured to a value other than that of the native VLAN.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

ESXI-65-000065 - For the ESXi host all port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

CONFIGURATION MANAGEMENT

ESXI-67-000063 - For the ESXi host, all port groups must be configured to a value other than that of the native VLAN.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

CONFIGURATION MANAGEMENT

ESXI-67-000065 - For the ESXi host, all port groups must not be configured to VLAN values reserved by upstream physical switches.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

CONFIGURATION MANAGEMENT

ESXI-70-000063 - All port groups on standard switches must be configured to a value other than that of the native virtual local area network (VLAN).DISA VMware vSphere 7.0 ESXi STIG v1r4 VMwareVMware

CONFIGURATION MANAGEMENT

ESXI-70-000065 - All port groups on standard switches must not be configured to virtual local area network (VLAN) values reserved by upstream physical switches.DISA VMware vSphere 7.0 ESXi STIG v1r4 VMwareVMware

CONFIGURATION MANAGEMENT

ESXI5-VMNET-000010 - All port groups must be configured to a value other than that of the native VLAN.DISA VMWare ESXi 5.0 Server STIG v2r1VMware

CONFIGURATION MANAGEMENT

GEN000100 - The operating system must be a supported release.DISA STIG Solaris 10 X86 v2r4Unix

CONFIGURATION MANAGEMENT

JUEX-L2-000050 - The Juniper EX switch must be configured to permit authorized users to select a user session to capture.DISA Juniper EX Series Layer 2 Switch v2r4Juniper

AUDIT AND ACCOUNTABILITY

JUEX-L2-000200 - The Juniper EX switch must not be configured with VLANs used for L2 control traffic assigned to any host-facing access interface.DISA Juniper EX Series Layer 2 Switch v2r4Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000010 - The Oracle Linux operating system must be a vendor-supported release.DISA STIG Oracle Linux 6 v2r7Unix

CONFIGURATION MANAGEMENT

VCSA-70-000272 - The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).DISA STIG VMware vSphere 7.0 vCenter v1r3VMware

CONFIGURATION MANAGEMENT

VCSA-80-000272 - The vCenter Server must configure all port groups to a value other than that of the native virtual local area network (VLAN).DISA VMware vSphere 8.0 vCenter STIG v2r3VMware

CONFIGURATION MANAGEMENT

VCTR-67-000018 - The vCenter Server must configure all port groups to a value other than that of the native VLAN.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-06-000018 - All port groups must be configured to a value other than that of the native VLAN.DISA VMware vSphere vCenter Server Version 6 STIG v1r4VMware

CONFIGURATION MANAGEMENT

VCWN-65-000018 - The vCenter Server for Windows must configure all port groups to a value other than that of the native VLAN.DISA VMware vSphere 6.5 vCenter Server for Windows STIG v2r3VMware

CONFIGURATION MANAGEMENT