4.006 - Users will be forcibly disconnected when their logon hours expire. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | ACCESS CONTROL |
AMLS-NM-000240 - Arista MLS must terminate all network connections associated with a device management session at the end of the session. | DISA STIG Arista MLS DCS-7000 Series NDM V1R2 | Arista | ACCESS CONTROL |
AOSX-12-000720 - The OS X system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple Mac OSX 10.12 v1r6 | Unix | ACCESS CONTROL |
AOSX-12-000721 - The OS X system must be configured with the SSH daemon ClientAliveCountMax option set to 0. | DISA STIG Apple Mac OSX 10.12 v1r6 | Unix | ACCESS CONTROL |
APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0. | DISA STIG Apple macOS 11 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 12 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1. | DISA STIG Apple macOS 12 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 12 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements. | DISA STIG Cisco ASA NDM v1r6 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - ip http secure-server | DISA STIG Cisco IOS XE Switch NDM v1r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - ip http timeout | DISA STIG Cisco IOS XE Switch NDM v1r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - line con | DISA STIG Cisco IOS XE Switch NDM v1r1 | Cisco | ACCESS CONTROL |
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - line con | DISA STIG Cisco NX-OS Switch NDM v1r1 | Cisco | ACCESS CONTROL |
CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - line vty | DISA STIG Cisco IOS XE Switch NDM v1r1 | Cisco | ACCESS CONTROL |
CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts. | DISA STIG Kubernetes v1r11 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-06-000042 - The system must terminate shell services after a predetermined period. | DISA STIG VMware vSphere 6.x ESXi v1r4 | VMware | ACCESS CONTROL |
ESXI-06-000043 - The system must logout of the console UI after a predetermined period. | DISA STIG VMware vSphere 6.x ESXi v1r4 | VMware | ACCESS CONTROL |
ESXI-65-000041 - The ESXi host must set a timeout to automatically disable idle sessions after 10 minutes. | DISA STIG VMware vSphere ESXi 6.5 v1r4 | VMware | ACCESS CONTROL |
ESXI-65-000043 - The ESXi host must logout of the console UI after 10 minutes. | DISA STIG VMware vSphere ESXi 6.5 v1r4 | VMware | ACCESS CONTROL |
ESXI-70-000042 - The ESXi host must terminate shell services after 10 minutes. | DISA STIG VMware vSphere 7.0 ESXi v1r2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-70-000043 - The ESXi host must log out of the console UI after two minutes. | DISA STIG VMware vSphere 7.0 ESXi v1r2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
F5BI-DM-000139 - The BIG-IP appliance must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be configured to be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements. | DISA F5 BIG-IP Device Management 11.x STIG v1r7 | F5 | ACCESS CONTROL |
F5BI-LT-000093 - The BIG-IP Core implementation must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after 10 minutes of inactivity; and for user sessions (non-privileged session), the session must be terminated after 15 minutes of inactivity. | DISA F5 BIG-IP Local Traffic Manager 11.x STIG v1r3 | F5 | ACCESS CONTROL |
FGFW-ND-000275 - The FortiGate device must terminate idle sessions after 10 minutes of inactivity. | DISA Fortigate Firewall NDM STIG v1r4 | FortiGate | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-NM-000360 - The Juniper EX switch must be configured to end all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill mission requirements. | DISA Juniper EX Series Network Device Management v1r5 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
JUNI-ND-000710 - The Juniper router must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - < 10 | DISA STIG Juniper Router NDM v1r5 | Juniper | ACCESS CONTROL |
JUNI-ND-000710 - The Juniper router must be configured to terminate all network connections associated with device management after 10 minutes of inactivity - > 10 | DISA STIG Juniper Router NDM v1r5 | Juniper | ACCESS CONTROL |
OL08-00-010200 - OL 8 must be configured so that all network connections associated with SSH traffic are terminate after a period of inactivity. | DISA Oracle Linux 8 STIG v1r2 | Unix | |
OL08-00-010201 - OL 8 must be configured so that all network connections associated with SSH traffic are terminated at the end of the session or after 10 minutes of inactivity. | DISA Oracle Linux 8 STIG v1r1 | Unix | |
OL08-00-010201 - OL 8 must be configured so that all network connections associated with SSH traffic are terminated at the end of the session or after 10 minutes of inactivity. | DISA Oracle Linux 8 STIG v1r4 | Unix | |
OL08-00-020035 - OL 8 must terminate idle user sessions. | DISA Oracle Linux 8 STIG v1r9 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-30-000037 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions. | DISA STIG VMware vSphere 7.0 Photon OS v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-67-000038 - The Photon operating system must configure sshd to disconnect idle SSH sessions. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-67-000039 - The Photon operating system must configure sshd to disconnect idle SSH sessions. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-09-412080 - RHEL 9 must terminate idle user sessions. | DISA Red Hat Enterprise Linux 9 STIG v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SHPT-00-000645 - SharePoint must terminate the network connection after a defined time period - 'FormDigestSettings.Enabled = True' | DISA STIG SharePoint 2010 v1r8 | Windows | ACCESS CONTROL |
SLES-15-010280 - The SUSE operating system SSH daemon must be configured with a timeout interval. | DISA SLES 15 STIG v1r10 | Unix | |
SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity. | DISA Symantec ProxySG Benchmark ALG v1r1 | BlueCoat | ACCESS CONTROL |
SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity. | DISA Symantec ProxySG Benchmark ALG v1r3 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - web timeout | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements. - cli timeout | DISA Symantec ProxySG Benchmark NDM v1r1 | BlueCoat | ACCESS CONTROL |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements. - web timeout | DISA Symantec ProxySG Benchmark NDM v1r1 | BlueCoat | ACCESS CONTROL |
UBTU-20-010037 - The Ubuntu operating system must immediately terminate all network connections associated with SSH traffic at the end of the session or after 10 minutes of inactivity. | DISA STIG Ubuntu 20.04 LTS v1r12 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000002 - The vCenter Server must not automatically refresh client sessions. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000004 - The vCenter Server must terminate management sessions after 10 minutes of inactivity. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000070 - The vCenter Server must not automatically refresh client sessions. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |