Item Search

NameAudit NamePluginCategory
1.16 APPL-14-000051CIS Apple macOS 14 (Sonoma) STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.60 UBTU-22-255035CIS Ubuntu Linux 22.04 LTS STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.100 UBTU-24-600010CIS Ubuntu Linux 24.04 LTS STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.158 OL08-00-020035CIS Oracle Linux 8 STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

1.297 RHEL-09-412080CIS Red Hat Enterprise Linux 9 STIG v1.0.0 CAT IIUnix

SYSTEM AND COMMUNICATIONS PROTECTION

3.074 - The system is not configured to force users to log off when their allowed logon hours expire.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

4.006 - Users must be forcibly disconnected when their logon hours expire.DISA Windows Vista STIG v6r41Windows

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple macOS 12 v1r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1.DISA STIG Apple macOS 12 v1r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 12 v1r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1.DISA STIG Apple macOS 13 v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000052 - The macOS system must configure SSHD ClientAliveCountMax to 1.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000110 - The macOS system must configure SSH ServerAliveInterval option set to 900.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000140 - The macOS system must set SSH Active Server Alive Maximum to 0.DISA Apple macOS 14 (Sonoma) STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000052 - The macOS system must configure SSHD ClientAliveCountMax to 1.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000110 - The macOS system must configure the SSH ServerAliveInterval to 900.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000140 - The macOS system must set SSH Active Server Alive Maximum to 0.DISA Apple macOS 15 (Sequoia) STIG v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Configure SSHD ClientAliveInterval option set to 900 or lessNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set Login Grace Time to 30 or LessNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Big Sur - Set SSHD Active Client Alive Maximum to ZeroNIST macOS Big Sur v1.4.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Cisco ASA NDM v2r2Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Configure SSHD ClientAliveInterval option set to 900 or lessNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Set Login Grace Time to 30 or LessNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

Catalina - Set SSHD Active Client Alive Maximum to ZeroNIST macOS Catalina v1.5.0 - All ProfilesUnix

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts.DISA STIG Kubernetes v2r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ESXi: esxi-8.shell-interactive-timeoutVMware vSphere Security Configuration and Hardening GuideVMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000275 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSH ServerAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

Monterey - Configure SSHD ClientAliveInterval option set to 900 or lessNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-30-000037 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions.DISA STIG VMware vSphere 7.0 Photon OS v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-40-000203 The Photon operating system must terminate idle Secure Shell (SSH) sessions.DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000039 - The Photon operating system must configure sshd to disconnect idle SSH sessions.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - cli timeoutDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - web timeoutDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010036 - The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic after a period of inactivity.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010037 - The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity.DISA Canonical Ubuntu 20.04 LTS STIG v2r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-22-255030 - Ubuntu 22.04 LTS must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Canonical Ubuntu 22.04 LTS STIG v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-24-600010 - Ubuntu 24.04 LTS must immediately terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity.DISA Canonical Ubuntu 24.04 LTS STIG v1r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000002 - The vCenter Server must not automatically refresh client sessions.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION