Item Search

NameAudit NamePluginCategory
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types.DISA STIG AIX 7.x v2r9Unix

ACCESS CONTROL

AOSX-13-030014 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL

AOSX-14-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-15-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

APPL-11-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-11-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL

APPL-12-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 12 v1r8Unix

ACCESS CONTROL

APPL-13-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 13 v1r3Unix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-171Unix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL

OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000508 - The system must allow locking of graphical desktop sessions.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL07-00-010060 - The Oracle Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL

OL08-00-020030 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for graphical user sessions.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

OL08-00-020039 - OL 8 must have the tmux package installed.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

OL08-00-020041 - OL 8 must ensure session control is automatically started at shell initialization.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

OL08-00-020042 - OL 8 must prevent users from disabling session control mechanisms.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

OL08-00-020043 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for command line sessions.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Oracle Linux 8 STIG v1r9Unix

ACCESS CONTROL

RHEL-06-000508 - The system must allow locking of graphical desktop sessions.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

SLES-12-010060 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL

SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL

SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 15 STIG v1r12Unix

ACCESS CONTROL

SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 15 STIG v1r12Unix

ACCESS CONTROL

SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 SPARC v2r9Unix

ACCESS CONTROL

SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 X86 v2r9Unix

ACCESS CONTROL

UBTU-16-010050 - All users must be able to directly initiate a session lock for all connection types.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

UBTU-18-010403 - The Ubuntu operating system must be configured for users to directly initiate a session lock for all connection types.DISA STIG Ubuntu 18.04 LTS v2r13Unix

ACCESS CONTROL

UBTU-20-010005 - The Ubuntu operating system must allow users to directly initiate a session lock for all connection types.DISA STIG Ubuntu 20.04 LTS v1r10Unix

ACCESS CONTROL