Item Search

NameAudit NamePluginCategory
1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS Red Hat EL9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS Rocky Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditctlCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS Red Hat EL9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - auditdCIS Rocky Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS Red Hat EL9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - augenrulesCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - aureportCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS Red Hat EL9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS Rocky Linux 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS Red Hat EL9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - ausearchCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS AlmaLinux OS 9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS Red Hat EL9 Server L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS Rocky Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

1.3.3 Ensure cryptographic mechanisms are used to protect the integrity of audit tools - autraceCIS Oracle Linux 9 Workstation L1 v1.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

2.1.1 Secure Installation via ISC SourceCIS ISC BIND 9.0/9.5 v2.0.0Unix

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v2.0.0 L1 + BL + NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v2.0.0 L1 + NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.5 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Stand-alone v2.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v2.0.0 L1 + BL + NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v2.0.0 L1 + NGWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 Enterprise v2.0.0 L1 + BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.4.6 Ensure 'LSA Protection' is set to 'Enabled'CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.1 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock' - Enabled: Enabled with UEFI LockCIS Microsoft Windows Server 2019 DC NG v2.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows 11 Enterprise v2.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows 11 Stand-alone v2.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows 11 Stand-alone v2.0.0 L1 + BLWindows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows 10 EMS Gateway v2.0.0 L1Windows

SYSTEM AND INFORMATION INTEGRITY

18.9.25.2 Ensure 'Configures LSASS to run as a protected process' is set to 'Enabled: Enabled with UEFI Lock'CIS Microsoft Windows 11 Enterprise v2.0.0 L1 + BLWindows

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure Secure Boot Level Set to FullNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Big Sur - Ensure Secure Boot Level Set to FullNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

SYSTEM AND INFORMATION INTEGRITY

Catalina - Ensure Secure Boot Level Set to FullNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY

Configures LSASS to run as a protected processMSCT Windows 11 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Authenticity' is correctTenable Cisco Firepower Best Practices AuditCisco

SYSTEM AND INFORMATION INTEGRITY

Ensure 'Image Integrity' is correctTenable Cisco Firepower Threat Defense Best Practices AuditCisco_Firepower

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-acceptedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-certifiedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-supportedVMWare vSphere 6.5 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

ESXi : verify-acceptance-level-supportedVMWare vSphere 6.0 Hardening GuideVMware

SYSTEM AND INFORMATION INTEGRITY

LSA ProtectionMSCT Windows 10 v22H2 v1.0.0Windows

SYSTEM AND INFORMATION INTEGRITY

Monterey - Ensure Secure Boot Level Set to FullNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

SYSTEM AND INFORMATION INTEGRITY