1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctl | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctl | CIS AlmaLinux OS 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctl | CIS Red Hat EL9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctl | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd | CIS Rocky Linux 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd | CIS Red Hat EL9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditd | CIS Oracle Linux 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | CIS AlmaLinux OS 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | CIS Rocky Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | CIS Red Hat EL9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrules | CIS Oracle Linux 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport | CIS Red Hat EL9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport | CIS Rocky Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureport | CIS Oracle Linux 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearch | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearch | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autrace | CIS Oracle Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autrace | CIS AlmaLinux OS 9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autrace | CIS Rocky Linux 9 Server L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autrace | CIS Red Hat EL9 Workstation L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Debian 10 Server L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Debian 10 Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Ubuntu Linux 20.04 LTS Server L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.2.4.11 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Ubuntu Linux 20.04 LTS Workstation L1 v2.0.1 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS AlmaLinux OS 8 Workstation L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Rocky Linux 8 Server L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Red Hat EL8 Server L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Oracle Linux 8 Server L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS AlmaLinux OS 8 Server L1 v3.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
5.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools | CIS Rocky Linux 8 Workstation L1 v2.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
18.4.5 Ensure 'LSA Protection' is set to 'Enabled' | CIS Windows Server 2012 R2 MS L1 v3.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.5 Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v2.0.0 L1 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.5 Ensure 'LSA Protection' is set to 'Enabled' | CIS Windows Server 2012 R2 DC L1 v3.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.5 Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows Server 2019 Standalone DC L1 vCIS Microsoft Windows Server 2019 Standalone DC L1 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.5 Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows Server 2019 MS Standalone L1 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.6 Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v2.0.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.6 Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows Server 2016 MS L1 v2.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.4.6 Ensure 'LSA Protection' is set to 'Enabled' | CIS Microsoft Windows Server 2016 DC L1 v2.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.25.1 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' - Enabled: Enabled with UEFI Lock | CIS Microsoft Windows Server 2019 MS NG v2.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 v2.0.0 MS NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 v2.0.0 DC NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
Configures LSASS to run as a protected process | MSCT Windows 11 v23H2 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
Ensure 'Image Authenticity' is correct | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | SYSTEM AND INFORMATION INTEGRITY |
Ensure 'Image Integrity' is correct | Tenable Cisco Firepower Best Practices Audit | Cisco | SYSTEM AND INFORMATION INTEGRITY |