3.074 - The system is not configured to force users to log off when their allowed logon hours expire. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.006 - Users must be forcibly disconnected when their logon hours expire. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 11 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 11 v1r8 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-11-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less. | DISA STIG Apple macOS 11 v1r5 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 12 v1r9 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-12-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1. | DISA STIG Apple macOS 12 v1r9 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000051 - The macOS system must be configured with the SSH daemon ClientAliveInterval option set to 900 or less. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-13-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 1. | DISA STIG Apple macOS 13 v1r4 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-14-000051 - The macOS system must configure SSHD ClientAliveInterval to 900. | DISA Apple macOS 14 (Sonoma) STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-14-000052 - The macOS system must configure SSHD ClientAliveCountMax to 1. | DISA Apple macOS 14 (Sonoma) STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-14-000053 - The macOS system must set Login Grace Time to 30. | DISA Apple macOS 14 (Sonoma) STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-14-000110 - The macOS system must configure SSH ServerAliveInterval option set to 900. | DISA Apple macOS 14 (Sonoma) STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-15-000052 - The macOS system must configure SSHD ClientAliveCountMax to 1. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-15-000053 - The macOS system must set login grace time to 30. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
APPL-15-000110 - The macOS system must configure the SSH ServerAliveInterval to 900. | DISA Apple macOS 15 (Sequoia) STIG v1r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
ARST-ND-000490 - The Arista network device must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements. | DISA STIG Arista MLS EOS 4.2x NDM v2r1 | Arista | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSHD ClientAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set Login Grace Time to 30 or Less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements - console timeout | DISA STIG Cisco ASA NDM v2r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements - http server | DISA STIG Cisco ASA NDM v2r1 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSHD ClientAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set Login Grace Time to 30 or Less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-K8-001300 - Kubernetes Kubelet must not disable timeouts. | DISA STIG Kubernetes v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
CNTR-R2-000890 Rancher RKE2 must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after five minutes of inactivity. | DISA Rancher Government Solutions RKE2 STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-70-000042 - The ESXi host must terminate shell services after 10 minutes. | DISA STIG VMware vSphere 7.0 ESXi v1r2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-70-000043 - The ESXi host must log out of the console UI after two minutes. | DISA STIG VMware vSphere 7.0 ESXi v1r2 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
ESXI-80-000196 The ESXi host must set a timeout to automatically end idle DCUI sessions after 10 minutes. | DISA VMware vSphere 8.0 ESXi STIG v2r1 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
JUEX-NM-000360 - The Juniper EX switch must be configured to end all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill mission requirements. | DISA Juniper EX Series Network Device Management v2r1 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSHD ClientAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set Login Grace Time to 30 or Less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Monterey v1.0.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
OL08-00-020035 - OL 8 must terminate idle user sessions. | DISA Oracle Linux 8 STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-30-000037 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions. | DISA STIG VMware vSphere 7.0 Photon OS v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-30-000038 - The Photon operating system must configure sshd to disconnect idle Secure Shell (SSH) sessions. | DISA STIG VMware vSphere 7.0 Photon OS v1r3 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-40-000203 The Photon operating system must terminate idle Secure Shell (SSH) sessions. | DISA VMware vSphere 8.0 vCenter Appliance Photon OS 4.0 STIG v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
PHTN-67-000038 - The Photon operating system must configure sshd to disconnect idle SSH sessions. | DISA STIG VMware vSphere 6.7 Photon OS v1r6 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-08-010200 - RHEL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. | DISA Red Hat Enterprise Linux 8 STIG v2r1 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
RHEL-09-412080 - RHEL 9 must terminate idle user sessions. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
SHPT-00-000645 - SharePoint must terminate the network connection associated with a communications session at the end of the session or after an organizationally defined time period of inactivity - 'FormDigestSettings.Enabled = True' | DISA STIG SharePoint 2010 v1r9 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - cli timeout | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - web timeout | DISA Symantec ProxySG Benchmark NDM v1r2 | BlueCoat | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-22-255030 - Ubuntu 22.04 LTS must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
UBTU-22-255035 - Ubuntu 22.04 LTS must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive. | DISA STIG Canonical Ubuntu 22.04 LTS v2r2 | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000004 - The vCenter Server must terminate management sessions after 10 minutes of inactivity. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000070 - The vCenter Server must not automatically refresh client sessions. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |
VCTR-67-000071 - The vCenter Server must terminate management sessions after 10 minutes of inactivity. | DISA STIG VMware vSphere 6.7 vCenter v1r4 | VMware | SYSTEM AND COMMUNICATIONS PROTECTION |