Item Search

NameAudit NamePluginCategory
1.4 Set 'Allow hyperlinks in suspected phishing e- mail messages' to 'Disabled'CIS MS Office Outlook 2010 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

1.11 Ensure anti-virus is installed and runningCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

SYSTEM AND INFORMATION INTEGRITY

1.23 Set 'Prevent users from customizing attachment security settings' to 'Enabled'CIS MS Office Outlook 2010 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

3.5 Ensure that SharePoint specific malware (i.e. anti-virus) protection software is integrated and configured - Attempt to cleanCIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

3.5 Ensure that SharePoint specific malware (i.e. anti-virus) protection software is integrated and configured - Scan on downloadCIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

3.5 Ensure that SharePoint specific malware (i.e. anti-virus) protection software is integrated and configured - Scan on uploadCIS Microsoft SharePoint 2016 OS v1.1.0Windows

SYSTEM AND INFORMATION INTEGRITY

6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.2 Ensure a secure antivirus profile is applied to all relevant security policiesCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.6 Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the InternetCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

6.6 Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the InternetCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

18.9.77.14 Ensure 'Turn off Windows Defender AntiVirus' is set to 'Disabled'CIS Windows 7 Workstation Level 1 v3.2.0Windows

SYSTEM AND INFORMATION INTEGRITY

Allow hyperlinks in suspected phishing e-mail messagesMicrosoft 365 Apps for Enterprise 2306 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use a virus scan program.DISA STIG AIX 6.1 v1r14Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'clean.dat'DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'clean.dat' - update dateDISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'names.dat'DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'names.dat' - update dateDISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'scan.dat'DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'scan.dat' - update dateDISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program - 'uvscan exists in crontabs'DISA STIG AIX 5.3 v1r2Unix

SYSTEM AND INFORMATION INTEGRITY

GEN006640 - The system must use and update a DoD-approved virus scan program.DISA STIG for Red Hat Enterprise Linux 5 v1r18 AuditUnix

SYSTEM AND INFORMATION INTEGRITY

GEN006650 - The Oracle Linux 5 operating system must use a virus scan program.DISA STIG for Oracle Linux 5 v2r1Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

RHEL-07-032000 - The Red Hat Enterprise Linux operating system must use a virus scan program.DISA Red Hat Enterprise Linux 7 STIG v3r14Unix

CONFIGURATION MANAGEMENT, SYSTEM AND INFORMATION INTEGRITY

SLES-12-030611 - The SUSE operating system must use a virus scan program.DISA SLES 12 STIG v2r13Unix

SYSTEM AND INFORMATION INTEGRITY