1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed Attempts | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed Attempts | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout Time | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout Time | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.1.8 Disable static keys for TLS | CIS Fortigate 7.0.x Level 2 v1.2.0 | FortiGate | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
2.1.9 Enable Global Strong Encryption | CIS Fortigate 7.0.x Level 2 v1.2.0 | FortiGate | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.1 Ensure a fully-synchronized High Availability peer is configured | CIS Palo Alto Firewall 11 v1.0.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Failure Condition | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Default deny configured' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 10.0.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 169.254.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 172.16.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 224.0.0.0' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny internal networks' | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.2.2 Set inbound 'ip access-group' on the External Interface | CIS Cisco IOS 16 L2 v2.0.0 | Cisco | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately | CIS Palo Alto Firewall 11 v1.0.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Election Setings | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Passive Link State | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.2.18 ip6forwarding | CIS IBM AIX 7.2 L1 v1.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
4.7 Ensure to set Strong SSH KEY Exchange algorithm | CIS F5 Networks v1.0.0 L1 | F5 | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
6.14 Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the Internet | CIS Palo Alto Firewall 10 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
6.15 Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the Internet | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
6.20 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories - continue on the URL categories | CIS Palo Alto Firewall 9 v1.1.0 L1 | Palo_Alto | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.2 Ensure KeepAlive Is Enabled | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.3 Ensure MaxKeepAliveRequests is Set to a Value of 100 or Greater | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.3 Ensure MaxKeepAliveRequests is Set to a Value of 100 or Greater | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.4 Ensure KeepAliveTimeout is Set to a Value of 15 or Less | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - mod_reqtimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - RequestReadTimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - RequestReadTimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - mod_reqtimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - RequestReadTimeout | CIS Apache HTTP Server 2.4 L1 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.1 Ensure the LimitRequestLine directive is Set to 512 or less | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.1 Ensure the LimitRequestLine directive is Set to 512 or less | CIS Apache HTTP Server 2.4 L2 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.2 Ensure the LimitRequestFields Directive is Set to 100 or Less | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.2 Ensure the LimitRequestFields Directive is Set to 100 or Less | CIS Apache HTTP Server 2.4 L2 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.3 Ensure the LimitRequestFieldsize Directive is Set to 1024 or Less | CIS Apache HTTP Server 2.4 L2 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.4 Ensure the LimitRequestBody Directive is Set to 102400 or Less | CIS Apache HTTP Server 2.4 L2 v2.1.0 Middleware | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
10.4 Ensure the LimitRequestBody Directive is Set to 102400 or Less | CIS Apache HTTP Server 2.4 L2 v2.1.0 | Unix | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' | CIS Windows Server 2012 DC L2 v3.0.0 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' | CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 10 Stand-alone v2.0.0 L2 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 10 Stand-alone v2.0.0 L2 + BL | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.12 Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 11 Stand-alone v2.0.0 L2 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.5.12 Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3 | CIS Microsoft Windows 10 Stand-alone v2.0.0 L2 + BL + NG | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v2.0.0 L1 + BL + NG | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' | CIS Microsoft Intune for Windows 11 v2.0.0 L1 + BL | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' | CIS Microsoft Intune for Windows 10 v2.0.0 L1 | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |
18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' - Enabled | CIS Microsoft Windows 11 Stand-alone v2.0.0 L1 + BL | Windows | ACCESS CONTROL, CONFIGURATION MANAGEMENT |