2.1.6 Set 'service tcp-keepalives-in' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.1.7 Set 'service tcp-keepalives-out' | CIS Cisco IOS 12 L1 v4.0.0 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.6 Ensure 'Send connector timeout' is set to '10' | CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
2.2.7 Ensure 'Receive connector timeout' is set to '5' | CIS Microsoft Exchange Server 2019 L1 Mailbox v1.0.0 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.23 sqlnet.ora - 'sqlnet.inbound_connect_timeout = 3' | CIS v1.1.0 Oracle 11g OS L2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSH Active Server Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSH Active Server Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Ensure 'threat-detection statistics' is set to 'tcp-intercept' | Tenable Cisco Firepower Threat Defense Best Practices Audit | Cisco_Firepower | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set Login Grace Time to 30 or Less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-171 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSH Active Server Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Detection Prevention - IP TTL Decrement | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Flood Protection - TCP - Max Seg Lifetime | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |
SonicWALL - Flood Protection - TCP - Timeout <= 5 minutes | TNS SonicWALL v5.9 | SonicWALL | SYSTEM AND COMMUNICATIONS PROTECTION |