Item Search

NameAudit NamePluginCategory
1.5.5 Ensure number of concurrent sessions is limitedCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL

ARST-ND-000010 - The Arista network device must limit the number of concurrent sessions to an organization-defined number for each administrator account and/or administrator account type.DISA STIG Arista MLS EOS 4.2x NDM v1r1Arista

ACCESS CONTROL

Big Sur - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL

Big Sur - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Big Sur - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL

CASA-ND-000010 - The Cisco ASA must be configured to limit the number of concurrent management sessions to an organization-defined number.DISA STIG Cisco ASA NDM v1r6Cisco

ACCESS CONTROL

Catalina - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL

Catalina - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL

Catalina - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Always accept important ICMPTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Packet filter loggingTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring CIDR Network Addresses for the BIG-IP packet filter - Unhandled Packet ActionTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

Configuring the BIG-IP system to enforce the use of strict passwordsTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

EX13-EG-000005 - Exchange must limit the Receive connector timeout.DISA Microsoft Exchange 2013 Edge Transport Server STIG v1r5Windows

ACCESS CONTROL

FGFW-ND-000300 - The FortiGate device must limit the number of logon and user sessionsDISA Fortigate Firewall NDM STIG v1r4FortiGate

ACCESS CONTROL

GEN000450 - The system must limit users to 10 simultaneous system logins in accordance with operational requirements.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

GEN005533 - The SSH daemon must limit connections to a single session.DISA STIG AIX 5.3 v1r2Unix

ACCESS CONTROL

Monterey - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Limit Concurrent GUI Sessions to 10 for all AccountsNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

OL08-00-020024 - OL 8 must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA Oracle Linux 8 STIG v1r8Unix

ACCESS CONTROL

Overview of Appliance modeTenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

PHTN-30-000004 - The Photon operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA STIG VMware vSphere 7.0 Photon OS v1r2Unix

ACCESS CONTROL

PHTN-67-000004 - The Photon operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

ACCESS CONTROL

RHEL-08-020024 - RHEL 8 must limit the number of concurrent sessions to ten for all accounts and/or account types.DISA Red Hat Enterprise Linux 8 STIG v1r13Unix

ACCESS CONTROL

SLES-15-020020 - The SUSE operating system must limit the number of concurrent sessions to 10 for all accounts and/or account types.DISA SLES 15 STIG v1r12Unix

ACCESS CONTROL

Unable to limit Configuration utility access to clients using only TLSv1.1 or TLSv1.2Tenable F5 BIG-IP Best Practice AuditF5

ACCESS CONTROL

VCEM-70-000001 - ESX Agent Manager must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

ACCESS CONTROL

VCEM-70-000002 - ESX Agent Manager must limit the number of concurrent connections permitted.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

ACCESS CONTROL

VCEM-70-000003 - ESX Agent Manager must limit the maximum size of a POST request.DISA STIG VMware vSphere 7.0 EAM Tomcat v1r2Unix

ACCESS CONTROL

VCLU-70-000001 - Lookup Service must limit the amount of time that each Transport Control Protocol (TCP) connection is kept alive - TCP connection is kept alive.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

ACCESS CONTROL

VCLU-70-000002 - Lookup Service must limit the number of concurrent connections permitted.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

ACCESS CONTROL

VCLU-70-000003 - Lookup Service must limit the maximum size of a POST request.DISA STIG VMware vSphere 7.0 Lookup Service v1r2Unix

ACCESS CONTROL

VCPF-67-000003 - Performance Charts must limit the maximum size of a POST request.DISA STIG VMware vSphere 6.7 Perfcharts Tomcat v1r3Unix

ACCESS CONTROL

VCPF-70-000002 - Performance Charts must limit the number of concurrent connections permitted.DISA STIG VMware vSphere 7.0 Perfcharts Tomcat v1r1Unix

ACCESS CONTROL

VCPG-67-000001 - VMware Postgres must limit the number of connections.DISA STIG VMware vSphere 6.7 PostgreSQL v1r2Unix

ACCESS CONTROL

VCPG-70-000001 - VMware Postgres must limit the number of connections.DISA STIG VMware vSphere 7.0 PostgreSQL v1r2Unix

ACCESS CONTROL

VCRP-67-000002 - The rhttpproxy must set a limit on established connections.DISA STIG VMware vSphere 6.7 RhttpProxy v1r3Unix

ACCESS CONTROL

VCRP-70-000001 - Envoy must drop connections to disconnected clients.DISA STIG VMware vSphere 7.0 RhttpProxy v1r1Unix

ACCESS CONTROL

VCRP-70-000002 - Envoy must set a limit on established connections.DISA STIG VMware vSphere 7.0 RhttpProxy v1r1Unix

ACCESS CONTROL

VCST-67-000003 - The Security Token Service must limit the maximum size of a POST request.DISA STIG VMware vSphere 6.7 STS Tomcat v1r3Unix

ACCESS CONTROL

VCST-70-000001 - The Security Token Service must limit the amount of time that each Transmission Control Protocol (TCP) connection is kept alive.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

ACCESS CONTROL

VCST-70-000002 - The Security Token Service must limit the number of concurrent connections permitted.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

ACCESS CONTROL

VCST-70-000003 - The Security Token Service must limit the maximum size of a POST request.DISA STIG VMware vSphere 7.0 STS Tomcat v1r2Unix

ACCESS CONTROL

VCUI-67-000001 - vSphere UI must limit the amount of time that each TCP connection is kept alive.DISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

ACCESS CONTROL

VCUI-67-000003 - vSphere UI must limit the maximum size of a POST request.DISA STIG VMware vSphere 6.7 UI Tomcat v1r3Unix

ACCESS CONTROL

VCUI-70-000002 - vSphere UI must limit the number of concurrent connections permitted.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

ACCESS CONTROL

VCUI-70-000003 - vSphere UI must limit the maximum size of a POST request.DISA STIG VMware vSphere 7.0 vCA UI v1r2Unix

ACCESS CONTROL

WBSP-AS-000010 - The WebSphere Application Server maximum in-memory session count must be set according to application requirements.DISA IBM WebSphere Traditional 9 Windows STIG v1r1Windows

ACCESS CONTROL

WBSP-AS-000010 - The WebSphere Application Server maximum in-memory session count must be set according to application requirements.DISA IBM WebSphere Traditional 9 STIG v1r1Unix

ACCESS CONTROL