1.7 Audit Computer Name | CIS Apple macOS 10.14 v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 10.15 v2.1.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 11.0 Big Sur v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 10.15 Catalina v3.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
1.8 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 12.0 Monterey v2.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
2.3.3.12 Ensure Computer Name Does Not Contain PII or Protected Organizational Information | CIS Apple macOS 13.0 Ventura v1.0.0 L2 | Unix | CONFIGURATION MANAGEMENT, PROGRAM MANAGEMENT |
3.10 Ensure inbound firewall filter is set for Loopback interface | CIS Juniper OS Benchmark v2.1.0 L2 | Juniper | CONFIGURATION MANAGEMENT |
6.2 Ensure FTP Logon attempt restrictions is enabled | CIS IIS 10 v1.2.0 Level 1 | Windows | SYSTEM AND INFORMATION INTEGRITY |
8.6.3 Ensure virtual disk wiping is disabled | CIS VMware ESXi 7.0 v1.1.0 Level 1 | VMware | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
8.6.3 Ensure virtual disk wiping is disabled | CIS VMware ESXi 6.7 v1.2.0 Level 1 | VMware | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |
8.7.1 Ensure VIX messages from the VM are disabled | CIS VMware ESXi 6.7 v1.2.0 Level 2 | VMware | CONFIGURATION MANAGEMENT, SYSTEM AND SERVICES ACQUISITION |