1.3.1 Ensure that the --terminated-pod-gc-threshold argument is set as appropriate | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Master | Unix | SYSTEM AND INFORMATION INTEGRITY |
2.2.4.7.5 Ensure 'Turn off file validation' is set to 'Disabled' | CIS Microsoft Office Enterprise v1.1.0 L1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
3.2 Enable Stack Protection - set noexec_user_stack = 1 | CIS Solaris 11 L1 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.2 Enable Stack Protection - set noexec_user_stack = 1 | CIS Solaris 11.1 L1 v1.0.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
3.3 Enable Stack Protection - Makes sure 'noexec_user_stack' is set to 1 in /etc/system. Note: Only applicable if NX bit is set. | CIS Solaris 10 L1 v5.2 | Unix | SYSTEM AND INFORMATION INTEGRITY |
4.2.5 Ensure that the --streaming-connection-idle-timeout argument is not set to 0 | CIS Kubernetes v1.20 Benchmark v1.0.1 L1 Worker | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.3.3 Ensure sudo commands use pty | CIS IBM AIX 7.2 L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
6.5 Services - at access is root only | CIS IBM AIX 7.2 L2 v1.1.0 | Unix | SYSTEM AND INFORMATION INTEGRITY |
10.18 Enable memory leak listener (verify present) | CIS Apache Tomcat 7 L1 v1.1.0 Middleware | Unix | SYSTEM AND INFORMATION INTEGRITY |
18.7.2 (L1) Ensure 'Configure Redirection Guard' is set to 'Enabled: Redirection Guard Enabled' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Member Server | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.2 (L1) Ensure 'Configure Redirection Guard' is set to 'Enabled: Redirection Guard Enabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.2 (L1) Ensure 'Configure Redirection Guard' is set to 'Enabled: Redirection Guard Enabled' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles' | CIS Microsoft Windows Server 2016 v3.0.0 L1 MS | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles' | CIS Microsoft Windows Server 2016 v3.0.0 L1 DC | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.7.9 (L1) Ensure 'Manage processing of Queue-specific files' is set to 'Enabled: Limit Queue-specific files to Color profiles' | CIS Microsoft Windows Server 2022 v3.0.0 L1 Member Server | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.8.5.1 Ensure 'Turn On Virtualization Based Security' is set to 'Enabled' | CIS Microsoft Windows Server 2019 STIG NG DC v1.0.1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.5.7 (L1) Ensure 'Turn On Virtualization Based Security: Kernel-mode Hardware-enforced Stack Protection' is set to 'Enabled: Enabled in enforcement mode' | CIS Microsoft Windows 11 Enterprise v3.0.0 L1 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.7.1.6 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes' | CIS Microsoft Intune for Windows 11 v2.0.0 L1 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.7.1.6 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes' | CIS Microsoft Intune for Windows 11 v2.0.0 L1 + BL + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.7.1.6 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes' | CIS Microsoft Intune for Windows 11 v2.0.0 L2 + BL + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.7.1.6 Ensure 'Prevent installation of devices using drivers that match these device setup classes: Prevent installation of devices using drivers for these device setup' is set to 'IEEE 1394 device setup classes' | CIS Microsoft Intune for Windows 11 v2.0.0 L2 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 v3.0.0 NG - Member Server | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows Server 2022 v3.0.0 NG - Domain Controller | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.9.26.2 (NG) Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.8.1.1 Ensure 'Configure enhanced anti-spoofing' is set to 'Enabled' - Enabled | CIS Microsoft Windows Server 2019 Standalone DC L1 vCIS Microsoft Windows Server 2019 Standalone DC L1 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.8.1.1 Ensure 'Configure enhanced anti-spoofing' is set to 'Enabled' - Enabled | CIS Microsoft Windows Server 2019 MS Standalone L1 v1.0.0 | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' | CIS Microsoft Windows 11 Enterprise v3.0.0 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 (BL) Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' - Enabled | CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.2.2 Ensure 'Allow Secure Boot for integrity validation' is set to 'Enabled' - Enabled | CIS Microsoft Windows 11 Stand-alone v2.0.0 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Enterprise v3.0.0 L1 + BL + NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 11 Enterprise v3.0.0 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L1 BL NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL NG | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 (BL) Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' | CIS Microsoft Windows 10 Stand-alone v3.0.0 L2 BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' - Enabled | CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
18.10.9.4 Ensure 'Disable new DMA devices when this computer is locked' is set to 'Enabled' - Enabled | CIS Microsoft Windows 11 Stand-alone v2.0.0 L1 + BL | Windows | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestBody' | TNS IBM HTTP Server Best Practice Middleware | Unix | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestFieldsize' | TNS IBM HTTP Server Best Practice | Unix | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestFieldsize' | TNS IBM HTTP Server Best Practice Middleware | Unix | SYSTEM AND INFORMATION INTEGRITY |
Buffer overflow protection should be configured 'LimitRequestline' | TNS IBM HTTP Server Best Practice | Unix | SYSTEM AND INFORMATION INTEGRITY |
ESXi : TransparentPageSharing-intra-enabled | VMWare vSphere 6.5 Hardening Guide | VMware | SYSTEM AND INFORMATION INTEGRITY |
ESXi : TransparentPageSharing-intra-enabled | VMWare vSphere 6.0 Hardening Guide | VMware | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Share Memory Control (QSHRMEMCTL) - '1' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Share Memory Control (QSHRMEMCTL) - '1' | IBM System i Security Reference for V7R3 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
IBM i : Share Memory Control (QSHRMEMCTL) - '1' | IBM System i Security Reference for V7R2 | AS/400 | SYSTEM AND INFORMATION INTEGRITY |
Potential strpy buffer overflow in C/C++ code. | TNS File Analysis - Source Code Errors | FileContent | SYSTEM AND INFORMATION INTEGRITY |