Item Search

NameAudit NamePluginCategory
1.29 (L1) Ensure 'URLs for which local IPs are exposed in WebRTC ICE candidates' is set to 'Disabled'CIS Google Chrome L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

2.2.1 (L1) Ensure 'Access Credential Manager as a trusted caller' is set to 'No One'CIS Azure Compute Microsoft Windows Server 2019 v1.0.0 L1 DCWindows

AUDIT AND ACCOUNTABILITY

2.9.1 (L1) Ensure 'Enable saving passwords to the password manager' is Explicitly ConfiguredCIS Google Chrome Group Policy v1.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

2.17 (L1) Ensure 'Enable deleting browser and download history' is set to 'Disabled'CIS Google Chrome Group Policy v1.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

2.26 (L1) Ensure 'Block third party cookies' is set to 'Enabled'CIS Google Chrome Group Policy v1.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

2.54 (L1) Ensure 'Import autofill form data from default browser on first run' is set to 'Disabled'CIS Google Chrome Group Policy v1.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

2.78 (L1) Ensure 'Enable or disable spell checking web service' is set to 'Disabled'CIS Google Chrome Group Policy v1.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

3.12 (L1) Ensure 'Enable reporting of usage and crash-related data' is set to 'Disabled'CIS Google Chrome L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

3.13 (L1) Ensure 'Enable Safe Browsing for trusted sources' is set to 'Disabled'CIS Google Chrome L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

4.1.4 Ensure events that modify user/group information are collected - /etc/groupCIS Debian Family Server L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/groupCIS CentOS 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/gshadowCIS CentOS 6 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/gshadowCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/passwdCIS CentOS 6 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/passwdCIS Debian Family Server L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/security/opasswdCIS Debian Family Server L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadowCIS Debian Family Server L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - auditctl /etc/shadowCIS Oracle Linux 6 Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/gshadowCIS CentOS 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/gshadowCIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/passwdCIS CentOS 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/passwdCIS Red Hat 6 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/security/opasswdCIS Red Hat 6 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/shadowCIS Oracle Linux 6 Server L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.4 Ensure events that modify user/group information are collected - rules.d /etc/shadowCIS Red Hat 6 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collectedCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collected - /etc/security/opasswdCIS Aliyun Linux 2 L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collected - /etc/security/opasswdCIS Debian 9 Workstation L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collected - /etc/shadowCIS Debian 9 Server L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.5 Ensure events that modify user/group information are collected - auditctl /etc/security/opasswdCIS Debian 9 Server L2 v1.0.1Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoersCIS CentOS 6 Server L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoersCIS Oracle Linux 6 Workstation L2 v2.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d/CIS Debian Family Server L2 v1.0.0Unix

AUDIT AND ACCOUNTABILITY

4.1.14 Ensure changes to system administration scope (sudoers) is collected - auditctl /etc/sudoers.d/CIS Red Hat 6 Workstation L2 v3.0.0Unix

AUDIT AND ACCOUNTABILITY

4.2.4 (L1) Ensure 'Block clipboard on these sites' Is ConfiguredCIS Google Chrome L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

4.5 (L2) Ensure 'Allow or deny video capture' is set to 'Disabled'CIS Google Chrome L2 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

4.6 (L1) Ensure 'Allow user feedback' is set to 'Disabled'CIS Google Chrome L1 v3.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

6.3.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Oracle Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure changes to system administration scope (sudoers) is collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 STIGUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure modification of the /etc/sudoers file is collectedCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure modification of the /etc/sudoers file is collectedCIS Red Hat Enterprise Linux 10 v1.0.1 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.1 Ensure modification of the /etc/sudoers file is collectedCIS Red Hat Enterprise Linux 10 v1.0.1 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.8 Ensure events that modify user/group information are collectedCIS Oracle Linux 8 v4.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.8 Ensure events that modify user/group information are collectedCIS Red Hat Enterprise Linux 8 STIG v2.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.12 Ensure events that modify /etc/group information are collectedCIS Red Hat Enterprise Linux 10 v1.0.1 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.14 Ensure events that modify /etc/shadow and /etc/gshadow are collectedCIS Oracle Linux 10 v1.0.0 L2 WorkstationUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure events that modify /etc/security/opasswd are collectedCIS Oracle Linux 10 v1.0.0 L2 ServerUnix

AUDIT AND ACCOUNTABILITY

6.3.3.15 Ensure events that modify /etc/security/opasswd are collectedCIS Red Hat Enterprise Linux 10 v1.0.1 L2 ServerUnix

AUDIT AND ACCOUNTABILITY