Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • User Manual
  • Secure Baseline

Secure Baseline Lookup

The Secure Baseline Lookup feature enables administrators to explore configuration benchmarks and recommendations for specific operating systems. This tool provides valuable insights into best practices for securing your systems based on widely recognized standards.

Written by Chris Zator

Updated at November 27th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Benchmark Sources How to Use Secure Baseline Lookup Drill-Down for More Information

Benchmark Sources

Secure Baseline Lookup supports two primary benchmark sources:

  1. CISecurity Benchmarks: These are widely used in commercial and business environments.
  2. DISA STIG (Security Technical Implementation Guides): Designed for defense and government use cases.

By default, most businesses utilize CISecurity benchmarks, which align with best practices for general security configuration.

How to Use Secure Baseline Lookup

Select a Benchmark Source:

  • Use the dropdown menu to choose between CISecurity or DISA STIG.

Choose an Operating System:

  • Select the OS of interest from the available list. Options may include popular operating systems such as Windows, Linux, and macOS.

Browse Configuration Recommendations:

  • Once the benchmark source and OS are selected, a table displays all configuration recommendations included in the selected benchmark.
  • The table may include categories such as user account management, password policies, network configuration, and system logging settings.

Drill-Down for More Information

For a deeper understanding of the recommended practices:

Expand a Row:

  • Click the dropdown icon on any row to view detailed descriptions of specific configuration recommendations.

Benchmark Categories:

  • Recommendations are grouped into categories for easier navigation. Click on a category to view all related configuration practices.
secure baseline lookup secure baseline lookup cisecurity disa stig.

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How to Change the Secure Baseline Profile for Targets
  • Secure Baseline Scan History

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand