Item Search

NameAudit NamePluginCategory
1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed AttemptsCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed AttemptsCIS Palo Alto Firewall 10 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimeCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout TimeCIS Palo Alto Firewall 10 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.8 Disable static keys for TLSCIS Fortigate 7.0.x Level 2 v1.2.0FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

2.1.9 Enable Global Strong EncryptionCIS Fortigate 7.0.x Level 2 v1.2.0FortiGate

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.1 Ensure a fully-synchronized High Availability peer is configuredCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Failure ConditionCIS Palo Alto Firewall 10 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Default deny configured'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 10.0.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 169.254.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 172.16.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny 224.0.0.0'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.1 Set 'ip access-list extended' to Forbid Private Source Addresses from External Networks - 'Deny internal networks'CIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.2.2 Set inbound 'ip access-group' on the External InterfaceCIS Cisco IOS 16 L2 v2.0.0Cisco

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriatelyCIS Palo Alto Firewall 11 v1.0.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Election SetingsCIS Palo Alto Firewall 10 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Passive Link StateCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.2.18 ip6forwardingCIS IBM AIX 7.2 L1 v1.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

4.7 Ensure to set Strong SSH KEY Exchange algorithmCIS F5 Networks v1.0.0 L1F5

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.14 Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the InternetCIS Palo Alto Firewall 10 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.15 Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the InternetCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

6.20 Ensure that User Credential Submission uses the action of 'block' or 'continue' on the URL categories - continue on the URL categoriesCIS Palo Alto Firewall 9 v1.1.0 L1Palo_Alto

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.2 Ensure KeepAlive Is EnabledCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.3 Ensure MaxKeepAliveRequests is Set to a Value of 100 or GreaterCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.3 Ensure MaxKeepAliveRequests is Set to a Value of 100 or GreaterCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.4 Ensure KeepAliveTimeout is Set to a Value of 15 or LessCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - mod_reqtimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - RequestReadTimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.5 Ensure the Timeout Limits for Request Headers is Set to 40 or Less - RequestReadTimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - mod_reqtimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

9.6 Ensure Timeout Limits for the Request Body is Set to 20 or Less - RequestReadTimeoutCIS Apache HTTP Server 2.4 L1 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.1 Ensure the LimitRequestLine directive is Set to 512 or lessCIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.1 Ensure the LimitRequestLine directive is Set to 512 or lessCIS Apache HTTP Server 2.4 L2 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.2 Ensure the LimitRequestFields Directive is Set to 100 or LessCIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.2 Ensure the LimitRequestFields Directive is Set to 100 or LessCIS Apache HTTP Server 2.4 L2 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.3 Ensure the LimitRequestFieldsize Directive is Set to 1024 or LessCIS Apache HTTP Server 2.4 L2 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.4 Ensure the LimitRequestBody Directive is Set to 102400 or LessCIS Apache HTTP Server 2.4 L2 v2.1.0 MiddlewareUnix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

10.4 Ensure the LimitRequestBody Directive is Set to 102400 or LessCIS Apache HTTP Server 2.4 L2 v2.1.0Unix

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.10 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3'CIS Windows Server 2012 DC L2 v3.0.0Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3'CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 11 Stand-alone v2.0.0 L2Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 10 Stand-alone v2.0.0 L2Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.11 Ensure 'MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 10 Stand-alone v2.0.0 L2 + BLWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.12 Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 11 Stand-alone v2.0.0 L2Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.5.12 Ensure 'MSS: (TcpMaxDataRetransmissions) How many times unacknowledged data is retransmitted' is set to 'Enabled: 3' - Enabled: 3CIS Microsoft Windows 10 Stand-alone v2.0.0 L2 + BL + NGWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v2.0.0 L1 + BL + NGWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'CIS Microsoft Intune for Windows 11 v2.0.0 L1 + BLWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled'CIS Microsoft Intune for Windows 10 v2.0.0 L1Windows

ACCESS CONTROL, CONFIGURATION MANAGEMENT

18.6.11.2 Ensure 'Prohibit installation and configuration of Network Bridge on your DNS domain network' is set to 'Enabled' - EnabledCIS Microsoft Windows 11 Stand-alone v2.0.0 L1 + BLWindows

ACCESS CONTROL, CONFIGURATION MANAGEMENT