Item Search

NameAudit NamePluginCategory
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 10.15 Catalina v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 12.0 Monterey v3.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.1 Collect system configuration regularlyCIS IBM AIX 7.2 L1 v1.1.0Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanismsCIS MongoDB 4 L1 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - authenticationMechanismsCIS MongoDB 6 L2 OS Windows v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - CAFileCIS MongoDB 5 L2 OS Windows v1.2.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - CAFileCIS MongoDB 6 L2 OS Windows v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 4 L1 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 4 L1 OS Linux v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 6 L2 OS Windows v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 6 L2 OS Linux v1.1.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterAuthModeCIS MongoDB 5 L2 OS Linux v1.2.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterFileCIS MongoDB 4 L1 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterFileCIS MongoDB 4 L1 OS Linux v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterFileCIS MongoDB 5 L2 OS Windows v1.2.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - clusterFileCIS MongoDB 6 L2 OS Windows v1.1.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFileCIS MongoDB 4 L1 OS Windows v1.0.0Windows

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFileCIS MongoDB 4 L1 OS Linux v1.0.0Unix

CONFIGURATION MANAGEMENT

2.3 Ensure authentication is enabled in the sharded cluster - PEMKeyFileCIS MongoDB 6 L2 OS Linux v1.1.0Unix

CONFIGURATION MANAGEMENT

2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational InformationCIS Apple macOS 14.0 Sonoma v1.0.0 L2Unix

CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT

2.5.6 Enable Location ServicesCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6.6 Enable Location ServicesCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.9 L2 v1.3.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.11 El Capitan L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

2.6.7 Monitor Location Services AccessCIS Apple OSX 10.10 Yosemite L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

3.10 Ensure inbound firewall filter is set for Loopback interfaceCIS Juniper OS Benchmark v2.1.0 L2Juniper

CONFIGURATION MANAGEMENT

7.1 Extensible Firmware Interface (EFI) passwordCIS Apple macOS 10.14 v2.0.0 L2Unix

CONFIGURATION MANAGEMENT

7.4 Software Inventory ConsiderationsCIS Apple macOS 10.13 L2 v1.1.0Unix

CONFIGURATION MANAGEMENT

7.7 App Store Automatically download apps purchased on other Macs ConsiderationsCIS Apple macOS 10.12 L2 v1.2.0Unix

CONFIGURATION MANAGEMENT

8.3.2 Ensure use of the VM console is limitedCIS VMware ESXi 6.5 v1.0.0 Level 1VMware

CONFIGURATION MANAGEMENT

CIS Control 1 (1.4) Maintain Detailed Asset InventoryCAS Implementation Group 1 Audit FileUnix

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server v2004 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server 1903 MS v1.19.9Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server v1909 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT MSCT Windows Server 2022 DC v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server 2022 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server v1909 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server 2019 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows Server v20H2 MS v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 1809 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 1903 v1.19.9Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 v21H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 10 v22H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Enumeration policy for external devices incompatible with Kernel DMA ProtectionMSCT Windows 11 v23H2 v1.0.0Windows

CONFIGURATION MANAGEMENT

Rackspace Networks and their attached subnetsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Server ImagesTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Rackspace Subnet DetailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Databases Deployed In RackspaceTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT

Review the list of Ports and their detailsTenable Best Practices RackSpace v2.0.0Rackspace

CONFIGURATION MANAGEMENT