Item Search

NameAudit NamePluginCategory
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types.DISA STIG AIX 7.x v2r9Unix

ACCESS CONTROL

AOSX-13-030014 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.13 v2r5Unix

ACCESS CONTROL

AOSX-14-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.14 v2r6Unix

ACCESS CONTROL

AOSX-15-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.15 v1r10Unix

ACCESS CONTROL

APPL-11-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 11 v1r5Unix

ACCESS CONTROL

APPL-11-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 11 v1r8Unix

ACCESS CONTROL

APPL-12-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 12 v1r9Unix

ACCESS CONTROL

APPL-13-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 13 v1r4Unix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r4 HighUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-171Unix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - CNSSI 1253Unix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - 800-53r5 HighUnix

ACCESS CONTROL

Big Sur - Configure User Session Lock When a Smart Token is RemovedNIST macOS Big Sur v1.4.0 - All ProfilesUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r4 HighUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r5 HighUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - CNSSI 1253Unix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - All ProfilesUnix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-171Unix

ACCESS CONTROL

Catalina - Configure User Session Lock When a Smart Token is RemovedNIST macOS Catalina v1.5.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-171Unix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r4 HighUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - All ProfilesUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r5 ModerateUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r4 ModerateUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - 800-53r5 HighUnix

ACCESS CONTROL

Monterey - Configure User Session Lock When a Smart Token is RemovedNIST macOS Monterey v1.0.0 - CNSSI 1253Unix

ACCESS CONTROL

OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL6-00-000508 - The system must allow locking of graphical desktop sessions.DISA STIG Oracle Linux 6 v2r7Unix

ACCESS CONTROL

OL07-00-010060 - The Oracle Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures.DISA Oracle Linux 7 STIG v2r14Unix

ACCESS CONTROL

RHEL-06-000508 - The system must allow locking of graphical desktop sessions.DISA Red Hat Enterprise Linux 6 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-271045 - RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-271050 - RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-271055 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL

SLES-12-010060 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL

SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 12 STIG v2r13Unix

ACCESS CONTROL

UBTU-16-010050 - All users must be able to directly initiate a session lock for all connection types.DISA STIG Ubuntu 16.04 LTS v2r3Unix

ACCESS CONTROL

UBTU-18-010403 - The Ubuntu operating system must be configured for users to directly initiate a session lock for all connection types.DISA STIG Ubuntu 18.04 LTS v2r15Unix

ACCESS CONTROL

UBTU-20-010005 - The Ubuntu operating system must allow users to directly initiate a session lock for all connection types.DISA STIG Ubuntu 20.04 LTS v2r1Unix

ACCESS CONTROL

UBTU-22-412025 - Ubuntu 22.04 LTS must allow users to directly initiate a session lock for all connection types.DISA STIG Canonical Ubuntu 22.04 LTS v2r2Unix

ACCESS CONTROL