APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 11 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0. | DISA STIG Apple macOS 11 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 11 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 12 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1. | DISA STIG Apple macOS 12 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 12 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements - console timeout | DISA STIG Cisco ASA NDM v1r6 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements - http server | DISA STIG Cisco ASA NDM v1r6 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements. | DISA STIG Cisco ASA NDM v1r6 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - ip http timeout | DISA STIG Cisco IOS XE Switch NDM v1r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts. | DISA STIG Kubernetes v1r11 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-70-000042 - The ESXi host must terminate shell services after 10 minutes. | DISA STIG VMware vSphere 7.0 ESXi v1r2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000005 - Exchange must limit the Receive connector timeout. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-EG-000095 - Exchange Outbound Connection Timeout must be 10 minutes or less. | DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r4 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-MB-000230 - The Exchange Outbound Connection Timeout must be 10 minutes or less. | DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
EX13-MB-000275 - The Exchange Receive connector timeout must be limited. | DISA Microsoft Exchange 2013 Mailbox Server STIG v1r6 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
FGFW-ND-000275 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-NM-000360 - The Juniper EX switch must be configured to end all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill mission requirements. | DISA Juniper EX Series Network Device Management v1r5 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0960 - TCP intercept features must be provided by the network device - tcp-flags | DISA STIG Juniper Perimeter Router V8R30 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0960 - TCP intercept features must be provided by the network device - tcp-flags | DISA STIG Juniper Perimeter Router V8R32 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - Devices not configured to filter and drop half-open connections | DISA STIG Cisco Infrastructure Router and L3 Switch v8r28 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - Devices not configured to filter and drop half-open connections | DISA STIG Cisco Perimeter Router and L3 Switch v8r31 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - Devices not configured to filter and drop half-open connections | DISA STIG Cisco Perimeter Router v8r32 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - tcp-flags | DISA STIG Juniper Perimeter Router V8R30 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - tcp-flags | DISA STIG Juniper Perimeter Router V8R32 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'class-map' | DISA STIG Cisco Firewall v8r25 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'policy-map' | DISA STIG Cisco Firewall v8r25 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'service-policy' | DISA STIG Cisco Firewall v8r25 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
OL08-00-020035 - OL 8 must terminate idle user sessions. | DISA Oracle Linux 8 STIG v1r9 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-30-000037 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions. | DISA STIG VMware vSphere 7.0 Photon OS v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-30-000038 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions. | DISA STIG VMware vSphere 7.0 Photon OS v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-67-000038 - The Photon operating system must configure sshd to disconnect idle SSH sessions. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-67-000039 - The Photon operating system must configure sshd to disconnect idle SSH sessions. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-08-010200 - RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-08-010201 - RHEL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-08-020035 - RHEL 8 must terminate idle user sessions. | DISA Red Hat Enterprise Linux 8 STIG v1r14 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SHPT-00-000645 - SharePoint must terminate the network connection associated with a communications session at the end of the session or after an organizationally defined time period of inactivity - 'FormDigestSettings.Enabled = True' | DISA STIG SharePoint 2010 v1r9 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity. | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - cli timeout | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - web timeout | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-20-010037 - The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000002 - The vCenter Server must not automatically refresh client sessions. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000070 - The vCenter Server must not automatically refresh client sessions. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000071 - The vCenter Server must terminate management sessions after 10 minutes of inactivity. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |