Item Search

NameAudit NamePluginCategory
4.028 - The amount of idle time required before suspending a session must be properly set.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.19 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMaxCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.19 Ensure SSH Idle Timeout Interval is configured - ClientAliveIntervalCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.046 - Terminal Services is not configured to set a time limit for disconnected sessions.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.047 - Terminal Services idle session time limit does not meet the requirement.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AMLS-NM-000240 - The Arista Multilayer Switch must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Arista MLS DCS-7000 Series NDM v1r3Arista

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-13-000720 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple Mac OSX 10.13 v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-13-000721 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple Mac OSX 10.13 v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-13-000722 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple Mac OSX 10.13 v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-14-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple Mac OSX 10.14 v2r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less.DISA STIG Apple Mac OSX 10.15 v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple Mac OSX 10.15 v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-15-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple Mac OSX 10.15 v1r10Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ARST-ND-000490 - The Arista network device must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Arista MLS EOS 4.2x NDM v1r1Arista

MAINTENANCE, SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000720 - The Cisco router must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA STIG Cisco IOS Router NDM v2r8Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000720 - The Cisco router must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA STIG Cisco IOS XE Router NDM v2r9Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000041 - The system must set a timeout to automatically disable idle sessions after a predetermined period.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000042 - The system must terminate shell services after a predetermined period.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000043 - The system must logout of the console UI after a predetermined period.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-65-000041 - The ESXi host must set a timeout to automatically disable idle sessions after 10 minutes.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-65-000042 - The ESXi host must terminate shell services after 10 minutes.DISA STIG VMware vSphere ESXi 6.5 v2r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000041 - The ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000042 - The ESXi host must terminate shell services after 10 minutes.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000043 - The ESXi host must log out of the console UI after two minutes.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000041 - The ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.DISA STIG VMware vSphere 7.0 ESXi v1r2VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

JUNI-ND-000710 - The Juniper router must be configured to terminate all network connections associated with device management after five minutes of inactivityDISA STIG Juniper Router NDM v2r3Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-AG-000105 - The Juniper SRX Services Gateway Firewall must terminate all communications sessions associated with user traffic after 15 minutes or less of inactivity.DISA Juniper SRX Services Gateway ALG v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-DM-000156 - The Juniper SRX Services Gateway must terminate a device management session after 10 minutes of inactivity, except to fulfill documented and validated mission requirements.DISA Juniper SRX Services Gateway NDM v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-DM-000157 - The Juniper SRX Services Gateway must terminate a device management session if the keep-alive count is exceeded.DISA Juniper SRX Services Gateway NDM v2r1Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

JUSX-VN-000022 - The Juniper SRX Services Gateway VPN must terminate all network connections associated with a communications session at the end of the session.DISA Juniper SRX Services Gateway VPN v2r2Juniper

SYSTEM AND COMMUNICATIONS PROTECTION

OL6-00-000230 - The SSH daemon must set a timeout interval on idle sessions.DISA STIG Oracle Linux 6 v2r7Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-040160 - The Oracle Linux operating system must be configured so that all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA Oracle Linux 7 STIG v2r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-AG-000052 - The Palo Alto Networks security platform must terminate communications sessions after 15 minutes of inactivity.DISA STIG Palo Alto ALG v2r3Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

PANW-NM-000069 - The Palo Alto Networks security platform must terminate management sessions after 10 minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Palo Alto NDM v2r2Palo_Alto

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-06-000230 - The SSH daemon must set a timeout interval on idle sessions.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-255095 - RHEL 9 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-412035 - RHEL 9 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SOL-11.1-040380 - The operating system must terminate the network connection associated with a communications session at the end of the session or after 10 minutes of inactivity.DISA STIG Solaris 11 X86 v2r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000002 - The system must not automatically refresh client sessions.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000004 - The system must terminate management sessions after 10 minutes of inactivity.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-65-000004 - The vCenter Server for Windows must terminate management sessions after 10 minutes of inactivity.DISA STIG VMware vSphere vCenter 6.5 v2r3VMware

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-08-000210 - Oracle WebLogic must terminate the network connection associated with a communications session at the end of the session or after a DoD-defined time period of inactivity.Oracle WebLogic Server 12c Linux v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-08-000210 - Oracle WebLogic must terminate the network connection associated with a communications session at the end of the session or after a DoD-defined time period of inactivity.Oracle WebLogic Server 12c Linux v2r1 MiddlewareUnix

SYSTEM AND COMMUNICATIONS PROTECTION

WBLC-08-000210 - Oracle WebLogic must terminate the network connection associated with a communications session at the end of the session or after a DoD-defined time period of inactivity.Oracle WebLogic Server 12c Windows v2r1Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-SO-000070 - The machine inactivity limit must be set to 15 minutes, locking the system with the screensaver.DISA Windows 11 STIG v1r5Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000034 - Users must be forcibly disconnected when their logon hours expire.DISA Windows Server 2012 and 2012 R2 DC STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN12-SO-000066 - The system must be configured to force users to log off when their allowed logon hours expire.DISA Windows Server 2012 and 2012 R2 MS STIG v3r7Windows

SYSTEM AND COMMUNICATIONS PROTECTION

WN22-DC-000160 - Windows Server 2022 directory service must be configured to terminate LDAP-based network connections to the directory server after five minutes of inactivity.DISA Windows Server 2022 STIG v1r4Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION