?
Solved

CAT Tool

Posted on 2014-10-24
1
Medium Priority
?
789 Views
Last Modified: 2014-11-12
Hi,

Where can I download this tool to test for the CIS Benchmark configurations ?  Also, the xml files to work with it.

Thanks

Jamie
0
Comment
Question by:Jack_son_
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 64

Accepted Solution

by:
btan earned 2000 total points
ID: 40403562
Apparently, the CIS-CAT Assessment Tool is available only to CIS Security Benchmarks Members. Members can download CIS-CAT from the CIS Members Web site. CIS does offer a 30 day trial of the tool for enterprises considering CIS Security Benchmarks membership.  See below for membership
http://benchmarks.cisecurity.org/membership/

The CIS benchmark, however, is available free. Check out these resource which include the benchmark and other free tools e.g.
    Apache HTTP Server Assessment Tool
    Oracle Database Server Assessment Tool
    Router Assessment Tool
    Unix Assessment Tools
http://benchmarks.cisecurity.org/downloads/browse/

CIS provided some tutorial as well - http://benchmarks.cisecurity.org/downloads/webcasts/ciscat/
0

Featured Post

7 Extremely Useful Linux Commands for Beginners

Just getting started with Linux? Here's a quick start guide that has 7 commands that we believe will come in handy.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This program is used to assist in finding and resolving common problems with wireless connections.
The well known Cerber ransomware continues to spread this summer through spear phishing email campaigns targeting enterprises. Learn how it easily bypasses traditional defenses - and what you can do to protect your data.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question