Item Search

NameAudit NamePluginCategory
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS Oracle Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS Oracle Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS Oracle Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS Rocky Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS Red Hat EL9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS Rocky Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS Oracle Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS Oracle Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS Oracle Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS AlmaLinux OS 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS Rocky Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Debian 10 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 8 Workstation L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Server L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Red Hat EL8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Oracle Linux 8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS AlmaLinux OS 8 Server L1 v3.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit toolsCIS Rocky Linux 8 Workstation L1 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Windows Server 2012 R2 MS L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v2.0.0 L1 + BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Windows Server 2012 R2 DC L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2019 Standalone DC L1 vCIS Microsoft Windows Server 2019 Standalone DC L1 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2019 MS Standalone L1 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v2.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2016 MS L1 v2.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows Server 2016 DC L1 v2.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.1 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' - Enabled: Enabled with UEFI LockCIS Microsoft Windows Server 2019 MS NG v2.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2022 v2.0.0 MS NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows Server 2022 v2.0.0 DC NGWindows

SYSTEM AND INFORMATION INTEGRITY

Configures LSASS to run as a protected processMSCT Windows 11 v23H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Integrity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY