Item Search

NameAudit NamePluginCategory
APPL-11-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 11 v1r3Unix
APPL-11-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 11 v1r6Unix
APPL-11-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 11 v1r6Unix
APPL-11-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 11 v1r6Unix
APPL-12-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 12 v1r3Unix
APPL-12-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 12 v1r5Unix
APPL-12-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 12 V1R2Unix
APPL-12-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 12 v1r4Unix
APPL-12-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 12 v1r3Unix
APPL-12-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 12 v1r7Unix
APPL-12-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 12 v1r4Unix
APPL-12-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 12 V1R2Unix
APPL-12-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 12 v1r7Unix
APPL-12-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 12 v1r3Unix
APPL-12-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 12 v1r4Unix
APPL-12-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 12 v1r5Unix
APPL-13-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock.DISA STIG Apple macOS 13 v1r2Unix
APPL-13-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures.DISA STIG Apple macOS 13 v1r3Unix
APPL-13-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started.DISA STIG Apple macOS 13 v1r1Unix
RHEL-08-020030 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.DISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-020030 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-020039 - RHEL 8 must have the tmux package installed.DISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions - lock-commandDISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions - lock-sessionDISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Red Hat Enterprise Linux 8 STIG v1r3Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix
RHEL-08-020040 - RHEL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions. - tmux.confDISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-020041 - RHEL 8 must ensure session control is automatically started at shell initialization - tmux shellDISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-020041 - RHEL 8 must ensure session control is automatically started at shell initialization.DISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-020041 - RHEL 8 must ensure session control is automatically started at shell initialization.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix
RHEL-08-020042 - RHEL 8 must prevent users from disabling session control mechanisms.DISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-020042 - RHEL 8 must prevent users from disabling session control mechanisms.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-020042 - RHEL 8 must prevent users from disabling session control mechanisms.DISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-020042 - RHEL 8 must prevent users from disabling session control mechanisms.DISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-020042 - RHEL 8 must prevent users from disabling session control mechanisms.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-020042 - RHEL 8 must prevent users from disabling session control mechanisms.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r7Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r8Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r1Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r11Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r5Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r6Unix
RHEL-08-020050 - RHEL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Red Hat Enterprise Linux 8 STIG v1r9Unix
RHEL-09-412020 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
RHEL-09-412020 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix
WN11-CC-000365 - Windows 11 must be configured to prevent Windows apps from being activated by voice while the system is locked - LetAppsActivateWithVoiceDISA Windows 11 STIG v1r4Windows
WN11-CC-000365 - Windows 11 must be configured to prevent Windows apps from being activated by voice while the system is locked - LetAppsActivateWithVoiceAboveLockDISA Windows 11 STIG v1r4Windows
WN11-CC-000365 - Windows 11 must be configured to prevent Windows apps from being activated by voice while the system is locked.DISA Windows 11 STIG v1r5Windows