Item Search

NameAudit NamePluginCategory
3.074 - The system is not configured to force users to log off when their allowed logon hours expire.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.006 - Users must be forcibly disconnected when their logon hours expire.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSHD ClientAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set Login Grace Time to 30 or LessNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set SSHD Active Client Alive Maximum to ZeroNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-171Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSHD ClientAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Set Login Grace Time to 30 or LessNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Set SSHD Active Client Alive Maximum to ZeroNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

DS00.3370_2008 - The directory service must be configured to terminate LDAP-based network connections to the directory server after five (5) minutes of inactivity.DISA Windows Server 2008 DC STIG v6r47Windows

SYSTEM AND COMMUNICATIONS PROTECTION

DS00.3370_2008_R2 - The directory service must be configured to terminate LDAP-based network connections to the directory server after five (5) minutes of inactivity.DISA Windows Server 2008 R2 DC STIG v1r34Windows

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSHD ClientAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabledDISA STIG Cisco Infrastructure Router and L3 Switch v8r28Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabledDISA STIG Cisco Infrastructure L3 Switch v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabledDISA STIG Cisco Perimeter L3 Switch v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabledDISA STIG Cisco Infrastructure Router v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabledDISA STIG Cisco Perimeter Router and L3 Switch v8r31Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabledDISA STIG Cisco Perimeter Router v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabled.DISA STIG Cisco L2 Switch V8R27Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0724 - TCP Keep-Alives must be enabled.DISA STIG Cisco L2 Switch v8r26Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - Devices not configured to filter and drop half-open connectionsDISA STIG Cisco Infrastructure L3 Switch v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - Devices not configured to filter and drop half-open connectionsDISA STIG Cisco Infrastructure Router v8r29Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - Devices not configured to filter and drop half-open connectionsDISA STIG Cisco Perimeter L3 Switch v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - from portsDISA STIG Juniper Perimeter Router V8R32Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - from portsDISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'class-map'DISA STIG Cisco Firewall v8r24Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'connection timeout'DISA STIG Cisco Firewall v8r24Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'connection timeout'DISA STIG Cisco Firewall v8r25Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'policy-map'DISA STIG Cisco Firewall v8r24Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'service-policy'DISA STIG Cisco Firewall v8r24Cisco

SYSTEM AND COMMUNICATIONS PROTECTION