3.074 - The system is not configured to force users to log off when their allowed logon hours expire. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
4.006 - Users must be forcibly disconnected when their logon hours expire. | DISA Windows Vista STIG v6r41 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSHD ClientAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set Login Grace Time to 30 or Less | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Big Sur v1.4.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSHD ClientAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set Login Grace Time to 30 or Less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Set SSHD Active Client Alive Maximum to Zero | NIST macOS Catalina v1.5.0 - All Profiles | Unix | SYSTEM AND COMMUNICATIONS PROTECTION |
DS00.3370_2008 - The directory service must be configured to terminate LDAP-based network connections to the directory server after five (5) minutes of inactivity. | DISA Windows Server 2008 DC STIG v6r47 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
DS00.3370_2008_R2 - The directory service must be configured to terminate LDAP-based network connections to the directory server after five (5) minutes of inactivity. | DISA Windows Server 2008 R2 DC STIG v1r34 | Windows | SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSHD ClientAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled | DISA STIG Cisco Infrastructure L3 Switch v8r29 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled | DISA STIG Cisco Infrastructure Router and L3 Switch v8r28 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled | DISA STIG Cisco Infrastructure Router v8r29 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled | DISA STIG Cisco Perimeter Router and L3 Switch v8r31 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled | DISA STIG Cisco Perimeter Router v8r32 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled | DISA STIG Cisco Perimeter L3 Switch v8r32 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled. | DISA STIG Cisco L2 Switch V8R27 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0724 - TCP Keep-Alives must be enabled. | DISA STIG Cisco L2 Switch v8r26 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0960 - TCP intercept features must be provided by the network device - tcp-flags | DISA STIG Juniper Perimeter Router V8R30 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0960 - TCP intercept features must be provided by the network device - tcp-flags | DISA STIG Juniper Perimeter Router V8R32 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - Devices not configured to filter and drop half-open connections | DISA STIG Cisco Infrastructure L3 Switch v8r29 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - from ports | DISA STIG Juniper Perimeter Router V8R32 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - from ports | DISA STIG Juniper Perimeter Router V8R30 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods - tcp-flags | DISA STIG Juniper Perimeter Router V8R30 | Juniper | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'class-map' | DISA STIG Cisco Firewall v8r24 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'class-map' | DISA STIG Cisco Firewall v8r25 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'connection timeout' | DISA STIG Cisco Firewall v8r24 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'connection timeout' | DISA STIG Cisco Firewall v8r25 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'policy-map' | DISA STIG Cisco Firewall v8r24 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |
NET0965 - The network device must drop half-open TCP connections through filtering thresholds or timeout periods. - 'service-policy' | DISA STIG Cisco Firewall v8r24 | Cisco | SYSTEM AND COMMUNICATIONS PROTECTION |