| 1.2.10 Set 'exec-timeout' to less than or equal to 10 min on 'ip http' | CIS Cisco IOS XE 17.x v2.2.1 L1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 1.161 WN16-DC-000160 | CIS Microsoft Windows Server 2016 STIG v4.0.0 DC CAT III | Windows | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 1.162 WN19-DC-000160 | CIS Microsoft Windows Server 2019 STIG v4.0.0 DC CAT III | Windows | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 1.162 WN22-DC-000160 | CIS Microsoft Windows Server 2022 STIG v3.0.0 DC CAT III | Windows | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 2.1.6 Set 'service tcp-keepalives-in' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 2.1.7 Set 'service tcp-keepalives-out' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 2.2.6 Ensure 'Send connector timeout' is set to '10' | CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 2.2.7 Ensure 'Receive connector timeout' is set to '5' | CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| 4.23 sqlnet.ora - 'sqlnet.inbound_connect_timeout = 3' | CIS v1.1.0 Oracle 11g OS L2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Ensure 'threat-detection statistics' is set to 'tcp-intercept' | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| ESXi: esxi-8.dcui-timeout | VMware vSphere Security Configuration and Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| ESXi: esxi-8.shell-timeout | VMware vSphere Security Configuration and Hardening Guide | VMware | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set Login Grace Time to 30 or Less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| Monterey - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| SonicWALL - Detection Prevention - IP TTL Decrement | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| SonicWALL - Flood Protection - TCP - Max Seg Lifetime | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION  | 
| SonicWALL - Flood Protection - TCP - Timeout <= 5 minutes | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION  |