Item Search

NameAudit NamePluginCategory
1.2.1 Ensure 'Account lockout duration' is set to '15 or more minute(s)'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

1.2.2 Ensure 'Account lockout threshold' is set to '10 or fewer invalid logon attempt(s), but not 0'CIS Windows 7 Workstation Level 1 v3.2.0Windows

ACCESS CONTROL

1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed AttemptsCIS Palo Alto Firewall 6 Benchmark L1 v1.0.0Palo_Alto

ACCESS CONTROL

4.4.1.2 Ensure latest version of authselect is installedCIS Rocky Linux 8 Server L1 v2.0.0Unix

ACCESS CONTROL

4.4.1.2 Ensure latest version of authselect is installedCIS Oracle Linux 8 Server L1 v3.0.0Unix

ACCESS CONTROL

4.4.2.1.1 Ensure pam_faillock module is enabledCIS Oracle Linux 7 v4.0.0 L1 ServerUnix

ACCESS CONTROL

5.2.1 Configure account lockout thresholdCIS Apple OSX 10.10 Yosemite L1 v1.2.0Unix

ACCESS CONTROL

5.3.1 Ensure password creation requirements are configured - 'retry=3'CIS Ubuntu Linux 14.04 LTS Workstation L1 v2.1.0Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - password-auth 'auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=900'CIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - password-auth 'auth sufficient pam_faillock.so authsucc audit deny=5 unlock_time=900'CIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - system-auth 'auth [default=die] pam_faillock.so authfail audit deny=5 unlock_time=900'CIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

5.3.2 Ensure lockout for failed password attempts is configured - system-auth 'auth [success=1 default=bad] pam_unix.so'CIS Amazon Linux v2.1.0 L1Unix

ACCESS CONTROL

6.4 Limit Consecutive Login Attempts for SSHCIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.4 Limit Consecutive Login Attempts for SSH - MaxAuthTries = 3CIS Solaris 11 L1 v1.1.0Unix

ACCESS CONTROL

6.6 Set Delay between Failed Login Attempts to 4.CIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.10 Set Delay between Failed Login Attempts to 4CIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.11 Set Retry Limit for Account Lockout, Check if 'LOCK_AFTER_RETRIES' in /etc/default/login is set to YESCIS Solaris 10 L1 v5.2Unix

ACCESS CONTROL

6.15 Set Retry Limit for Account Lockout - RETRIES = 3CIS Solaris 11.2 L1 v1.1.0Unix

ACCESS CONTROL

6.15 Set Retry Limit for Account Lockout - RETRIES = 3CIS Solaris 11.1 L1 v1.0.0Unix

ACCESS CONTROL

9.2.1 Set Password Creation Requirement Parameters Using pam_cracklib - retryCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

9.2.2 Set Lockout for Failed Password AttemptsCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

9.2.2 Set Lockout for Failed Password AttemptsCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

9.3.5 Set SSH MaxAuthTries to 4 or LessCIS Debian Linux 7 L1 v1.0.0Unix

ACCESS CONTROL

9.3.5 Set SSH MaxAuthTries to 4 or LessCIS Ubuntu 12.04 LTS Benchmark L1 v1.1.0Unix

ACCESS CONTROL

Account lockout durationMSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

Account lockout durationMSCT Windows Server 1903 DC v1.19.9Windows

ACCESS CONTROL

Account lockout durationMSCT Windows Server 2016 DC v1.0.0Windows

ACCESS CONTROL

Account lockout durationMSCT Windows Server 2019 MS v1.0.0Windows

ACCESS CONTROL

Account lockout durationMSCT Windows Server v20H2 DC v1.0.0Windows

ACCESS CONTROL

Brocade - lockout duration set to 30 minutesTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

Brocade - password warning must be set to at least 30 daysTenable Best Practices Brocade FabricOSBrocade

ACCESS CONTROL

FireEye - AAA lockout settings apply to the 'admin' userTNS FireEyeFireEye

ACCESS CONTROL

Fortigate - Admin password lockout >= 300 secondsTNS Fortigate FortiOS Best Practices v2.0.0FortiGate

ACCESS CONTROL

IBM i : Maximum Sign-On Attempts (QMAXSIGN) - '3'IBM iSeries Security Reference v5r4AS/400

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows 10 v21H1 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows 11 v23H2 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT MSCT Windows Server 2022 DC v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows 10 1809 v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows Server 1903 MS v1.19.9Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows Server v2004 DC v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows Server v2004 MS v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows Server 2012 R2 MS v1.0.0Windows

ACCESS CONTROL

Interactive logon: Machine account lockout thresholdMSCT Windows Server v20H2 MS v1.0.0Windows

ACCESS CONTROL

Reset account lockout counter afterMSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

Reset account lockout counter afterMSCT MSCT Windows Server 2022 DC v1.0.0Windows

ACCESS CONTROL

Reset account lockout counter afterMSCT Windows 10 1803 v1.0.0Windows

ACCESS CONTROL

Reset account lockout counter afterMSCT Windows 10 1903 v1.19.9Windows

ACCESS CONTROL

Reset account lockout counter afterMSCT Windows Server v2004 DC v1.0.0Windows

ACCESS CONTROL

This security setting determines whether the builtin Administrator account is subject to account lockout policy.MSCT Windows 10 v22H2 v1.0.0Windows

ACCESS CONTROL

User Authentication Security - Configure login security options to hinder password guessing attacks - maximum-timeJuniper Hardening JunOS 12 Devices ChecklistJuniper

ACCESS CONTROL