1.12.10 Configure connection Timeout | CIS Apache Tomcat5.5/6.0 L2 v1.0 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.6 Set 'service tcp-keepalives-in' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.6 Set 'service tcp-keepalives-in' | CIS Cisco IOS 15 L1 v4.0.1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.6 Set 'service tcp-keepalives-in' | CIS Cisco IOS 16 L1 v1.1.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.7 Set 'service tcp-keepalives-out' | CIS Cisco IOS 16 L1 v1.1.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.7 Set 'service tcp-keepalives-out' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.7 Set 'service tcp-keepalives-out' | CIS Cisco IOS 15 L1 v4.0.1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.6 Ensure 'Send connector timeout' is set to '10' | CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.7 Ensure 'Receive connector timeout' is set to '5' | CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.23 sqlnet.ora - 'sqlnet.inbound_connect_timeout = 3' | CIS v1.1.0 Oracle 11g OS L2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Ensure 'threat-detection statistics' is set to 'tcp-intercept' | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi: ft-backup-connect | TNS VMWare vSphere Best Practices | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi: ft-primary-connect | TNS VMWare vSphere Best Practices | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXi: user-search-max-time | TNS VMWare vSphere Best Practices | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set Login Grace Time to 30 or Less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives for Telnet Session must be enabled | DISA STIG Cisco Perimeter Router v8r8 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - Must limit TCP connections requests wait times | DISA STIG Cisco Perimeter Router v8r8 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
ScreenOS:DMZ Zone - TCP Reset | TNS Juniper ScreenOS Best Practices Audit | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
ScreenOS:Trust Zone - TCP Reset | TNS Juniper ScreenOS Best Practices Audit | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
ScreenOS:Untrust Zone - Disable TCP Reset | TNS Juniper ScreenOS Best Practices Audit | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Detection Prevention - IP TTL Decrement | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Detection Prevention - IP TTL Decrement | TNS SonicWALL v5.8 Best Practices | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Flood Protection - TCP - Max Seg Lifetime | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Flood Protection - TCP - Max Seg Lifetime | TNS SonicWALL v5.8 Best Practices | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Flood Protection - TCP - Timeout <= 5 minutes | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Flood Protection - TCP - Timeout <= 5 minutes | TNS SonicWALL v5.8 Best Practices | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |