Item Search

NameAudit NamePluginCategory
APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple macOS 12 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1.DISA STIG Apple macOS 12 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 12 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple macOS 13 v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1.DISA STIG Apple macOS 13 v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-13-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 13 v1r4Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements - console timeoutDISA STIG Cisco ASA NDM v1r6Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements - http serverDISA STIG Cisco ASA NDM v1r6Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Cisco ASA NDM v1r6Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - ip http timeoutDISA STIG Cisco IOS XE Switch NDM v1r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts.DISA STIG Kubernetes v1r11Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000042 - The ESXi host must terminate shell services after 10 minutes.DISA STIG VMware vSphere 7.0 ESXi v1r2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000005 - Exchange must limit the Receive connector timeout.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-EG-000095 - Exchange Outbound Connection Timeout must be 10 minutes or less.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000230 - The Exchange Outbound Connection Timeout must be 10 minutes or less.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

EX13-MB-000275 - The Exchange Receive connector timeout must be limited.DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6Windows

SYSTEM AND COMMUNICATIONS PROTECTION

FGFW-ND-000275 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity.DISA Fortigate Firewall NDM STIG v1r4FortiGate

SYSTEM AND COMMUNICATIONS PROTECTION

JUEX-NM-000360 - The Juniper EX switch must be configured to end all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill mission requirements.DISA Juniper EX Series Network Device Management v1r5Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0960 - TCP intercept features must be provided by the network device - tcp-flagsDISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0960 - TCP intercept features must be provided by the network device - tcp-flagsDISA STIG Juniper Perimeter Router V8R32Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - Devices not configured to filter and drop half-open connectionsDISA STIG Cisco Infrastructure Router and L3 Switch v8r28Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - Devices not configured to filter and drop half-open connectionsDISA STIG Cisco Perimeter Router and L3 Switch v8r31Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - Devices not configured to filter and drop half-open connectionsDISA STIG Cisco Perimeter Router v8r32Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - tcp-flagsDISA STIG Juniper Perimeter Router V8R30Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - tcp-flagsDISA STIG Juniper Perimeter Router V8R32Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'class-map'DISA STIG Cisco Firewall v8r25Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'policy-map'DISA STIG Cisco Firewall v8r25Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'service-policy'DISA STIG Cisco Firewall v8r25Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-020035 - OL 8 must terminate idle user sessions.DISA Oracle Linux 8 STIG v1r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-30-000037 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions.DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-30-000038 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions.DISA STIG VMware vSphere 7.0 Photon OS v1r3Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000038 - The Photon operating system must configure sshd to disconnect idle SSH sessions.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000039 - The Photon operating system must configure sshd to disconnect idle SSH sessions.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010200 - RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-010201 - RHEL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-020035 - RHEL 8 must terminate idle user sessions.DISA Red Hat Enterprise Linux 8 STIG v1r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

SHPT-00-000645 - SharePoint must terminate the network connection associated with a communications session at the end of the session or after an organizationally defined time period of inactivity - 'FormDigestSettings.Enabled = True'DISA STIG SharePoint 2010 v1r9Windows

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - cli timeoutDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - web timeoutDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

UBTU-20-010037 - The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity.DISA STIG Ubuntu 20.04 LTS v1r12Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000002 - The vCenter Server must not automatically refresh client sessions.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000070 - The vCenter Server must not automatically refresh client sessions.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000071 - The vCenter Server must terminate management sessions after 10 minutes of inactivity.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION