Item Search

NameAudit NamePluginCategory
2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION

2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

IDENTIFICATION AND AUTHENTICATION

2.1 Ensure that IP addresses are mapped to usernames - User ID AgentsCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

CONFIGURATION MANAGEMENT

2.1 Ensure that IP addresses are mapped to usernames - ZonesCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY

2.2 Ensure that WMI probing is disabledCIS Palo Alto Firewall 8 Benchmark L2 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

2.3 Ensure that User-ID is only enabled for internal trusted interfacesCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabledCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL, AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.5 Ensure all WildFire session information settings are enabledCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFireCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

SYSTEM AND INFORMATION INTEGRITY

5.6 Ensure alerts are enabled for malicious files detected by WildFire - log-type 'wildfire'CIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY, SYSTEM AND INFORMATION INTEGRITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - Log Container PageCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - RefererCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - User-AgentCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 7 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-ForCIS Palo Alto Firewall 8 Benchmark L1 v1.0.0Palo_Alto

AUDIT AND ACCOUNTABILITY

7.3 Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies rulesetCIS Palo Alto Firewall 6 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

7.3 Ensure 'Security Policy' denying any/all traffic exists at the bottom of the security policies rulesetCIS Palo Alto Firewall 7 Benchmark L2 v1.0.0Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION