Item Search

NameAudit NamePluginCategory
1.1.3 Ensure nodev option set on /tmp partitionCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

1.1.4 Ensure nosuid option set on /tmp partitionCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

1.1.8 Ensure nodev option set on /var/tmp partitionCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

1.1.9 Ensure nosuid option set on /var/tmp partitionCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

1.1.15 Ensure nodev option set on /dev/shm partitionCIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dump logging = enabledCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core dumps = enabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file contentCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file patternCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global core file patternCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - global setid core dumps = enabledCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - init core file contentCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process core dumps = disabledCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process setid core dumps = disabledCIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

3.1 Restrict Core Dumps to Protected Directory - per-process setid core dumps = disabledCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_ENABLED is set to yesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_LOG_ENABLED is set to yesCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_GLOB_PATTERN is set to /var/cores/core_%n_%f_%u_%g_%t_%pCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_INIT_PATTERN is set to coreCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_ENABLED is set to noCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

3.2 Restrict Core Dumps to Protected Directory - Check if COREADM_PROC_SETID_ENABLED is set to noCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

4.1 Disable core dumpsCIS FreeBSD v1.0.5Unix

ACCESS CONTROL

4.1 Restrict Core Dumps - 'fs.suid.dumpable = 0'CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

4.1 Restrict Core Dumps - 'hard core 0'CIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

4.3 Block users from viewing unowned processesCIS FreeBSD v1.0.5Unix

ACCESS CONTROL

5.2 Restrict Set-UID on User Mounted Devices - Check if nosuid option is set in /etc/rmmount.conf.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.9 Restrict at/cron To Authorized Users - should pass if 'root' exists in /etc/cron.d/cron.allow.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.13 Restrict at/cron to Authorized Users - /etc/cron.d/at.allowCIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

7.4 Restrict at/cron to authorized users (/var/at/at.allow)CIS FreeBSD v1.0.5Unix

ACCESS CONTROL

8.2.6 Prevent unauthorized removal and modification of devices.CIS VMware ESXi 5.5 v1.2.0 Level 1VMware

ACCESS CONTROL

9.8 Set 'Disable the Security page' to 'Enabled'CIS IE 9 v1.0.0Windows

ACCESS CONTROL

Configure Windows Defender SmartScreen - ShellSmartScreenLevelMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Enable local admin password managementMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPSMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPSMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPSMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPSMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPSMSCT Windows 10 1909 v1.0.0Windows

ACCESS CONTROL

Join Microsoft MAPS - SpynetReportingMSCT Windows 10 1803 v1.0.0Windows

ACCESS CONTROL

Network access: Do not allow anonymous enumeration of SAM accountsMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Network access: Do not allow anonymous enumeration of SAM accounts and sharesMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Network access: Restrict anonymous access to Named Pipes and SharesMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Network security: Allow LocalSystem NULL session fallbackMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLoggingMSCT Windows Server 2019 DC v1.0.0Windows

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLoggingMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLoggingMSCT Windows 10 1909 v1.0.0Windows

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLoggingMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockInvocationLoggingMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

Turn on PowerShell Script Block Logging - EnableScriptBlockLoggingMSCT Windows Server 2022 v1.0.0Windows

ACCESS CONTROL