1.1.3.11.17 Configure 'Network security: Force logoff when logon hours expire' | CIS Windows 8 L1 v1.0.0 | Windows | ACCESS CONTROL |
2.1 Enable Secure Admin Access - 'autologout.telnet.timeout <= 5' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
2.3.9.4 Ensure 'Microsoft network server: Disconnect clients when logon hours expire' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.5 Autologout - 'autologout.console.enable = on' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.5 Autologout - 'autologout.console.timeout <= 5' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.5 Autologout - 'ssh.idle.timeout <= 300' | TNS NetApp Data ONTAP 7G | NetApp | ACCESS CONTROL |
2.5.1 Ensure CLI session timeout is set to less than or equal to 10 minutes | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
2.5.4 Ensure Radius or TACACS+ server is configured - aaa server | CIS Check Point Firewall L1 v1.1.0 | CheckPoint | ACCESS CONTROL |
3.7 Ensure that SharePoint is set to reject or delay network traffic generated above traffic volume thresholds - connectionTimeout | CIS Microsoft SharePoint 2016 OS v1.1.0 | Windows | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS CentOS Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.18 spfile<sid>.ora - 'audit_sys_operations = TRUE' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL |
5.1.13 Ensure sshd LoginGraceTime is configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS Rocky Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.2.12 Ensure SSH Idle Timeout Interval is configured - 'ClientAliveCountMax' | CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0 | Unix | ACCESS CONTROL |
5.2.13 Ensure SSH LoginGraceTime is set to one minute or less | CIS Amazon Linux v2.1.0 L1 | Unix | ACCESS CONTROL |
5.4.5 Ensure default user shell timeout is 900 seconds or less - /etc/profile | CIS Amazon Linux v2.1.0 L2 | Unix | ACCESS CONTROL |
5.4.5 Ensure default user shell timeout is 900 seconds or less (/etc/profile) | CIS Ubuntu Linux 14.04 LTS Server L2 v2.1.0 | Unix | ACCESS CONTROL |
5.6 Set a timeout to automatically terminate idle ESXi Shell and SSH sessions | CIS VMware ESXi 5.1 v1.0.1 Level 1 | VMware | ACCESS CONTROL |
5.7 Set a timeout for Shell Services | CIS VMware ESXi 5.1 v1.0.1 Level 2 | VMware | ACCESS CONTROL |
9.3.12 Set Idle Timeout Interval for User Login - ClientAliveInterval | CIS Debian Linux 7 L1 v1.0.0 | Unix | ACCESS CONTROL |
18.9.59.3.10.1 Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less' | CIS Windows 7 Workstation Level 2 v3.2.0 | Windows | ACCESS CONTROL |
18.9.59.3.10.1 Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less' | CIS Windows 7 Workstation Level 2 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
Access Security - J-Web - Terminate idle connections by setting the idle-time value | Juniper Hardening JunOS 12 Devices Checklist | Juniper | ACCESS CONTROL |
Ensure default user shell timeout is 900 seconds or less - /etc/profile | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
Ensure SSH Idle Timeout Interval is configured - ClientAliveInterval | Tenable Cisco Firepower Management Center OS Best Practices Audit | Unix | ACCESS CONTROL |
FireEye - SSH users are logged out after 15 minutes of inactivity or less | TNS FireEye | FireEye | ACCESS CONTROL |
Fortigate - Inactivity timeout - 'console' <= 5 | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Fortigate - Inactivity timeout - 'global' <= 5 | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Fortigate - SSH login grace time <= 30 seconds | TNS Fortigate FortiOS Best Practices v2.0.0 | FortiGate | ACCESS CONTROL |
Huawei: User Interfaces Idle Timeout Less Than 5 Minutes | TNS Huawei VRP Best Practice Audit | Huawei | ACCESS CONTROL |
IBM i : Inactive Job Time-Out Interval (QINACTITV) - '60' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | ACCESS CONTROL |
IBM i : Inactive Job Time-Out Message Queue (QINACTMSGQ) - '*DSCJOB' | IBM System i Security Reference for V7R1 and V6R1 | AS/400 | ACCESS CONTROL |
Microsoft network server: Amount of idle time required before suspending session | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Amount of idle time required before suspending session | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Disconnect clients when logon hours expire | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Disconnect clients when logon hours expire | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network security: Force logoff when logon hours expire | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Network security: Force logoff when logon hours expire | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network security: Force logoff when logon hours expire | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
WatchGuard : Authentication Settings - 'Authentication User Timeout' | TNS Best Practice WatchGuard Audit 1.0.0 | WatchGuard | ACCESS CONTROL |
WatchGuard : Authentication Settings - 'Management User Idle Timeout' | TNS Best Practice WatchGuard Audit 1.0.0 | WatchGuard | ACCESS CONTROL |
WatchGuard : Authentication Settings - 'Management User Session Timeout' | TNS Best Practice WatchGuard Audit 1.0.0 | WatchGuard | ACCESS CONTROL |