Item Search

NameAudit NamePluginCategory
4.028 - The amount of idle time required before suspending a session must be properly set.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.19 Ensure SSH Idle Timeout Interval is configured - ClientAliveCountMaxCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.3.19 Ensure SSH Idle Timeout Interval is configured - ClientAliveIntervalCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.5.4 Ensure default user shell timeout is configuredCIS Red Hat Enterprise Linux 7 STIG v2.0.0 STIGUnix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.046 - Terminal Services is not configured to set a time limit for disconnected sessions.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

5.047 - Terminal Services idle session time limit does not meet the requirement.DISA Windows Vista STIG v6r41Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

AOSX-13-000721 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple Mac OSX 10.13 v2r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple macOS 11 v1r5Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-11-000052 - The macOS system must be configured with the SSH daemon ClientAliveCountMax option set to 0.DISA STIG Apple macOS 11 v1r8Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-12-000053 - The macOS system must be configured with the SSH daemon LoginGraceTime set to 30 or less.DISA STIG Apple macOS 12 v1r9Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000051 - The macOS system must configure SSHD ClientAliveInterval to 900.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000120 - The macOS system must configure SSHD Channel Timeout to 900.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000130 - The macOS system must configure SSHD unused connection timeout to 900.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-14-000140 - The macOS system must set SSH Active Server Alive Maximum to 0.DISA Apple macOS 14 (Sonoma) STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000051 - The macOS system must configure SSHD ClientAliveInterval to 900.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000120 - The macOS system must configure SSHD channel timeout to 900.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000130 - The macOS system must configure SSHD unused connection timeout to 900.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

APPL-15-000140 - The macOS system must set SSH Active Server Alive Maximum to 0.DISA Apple macOS 15 (Sequoia) STIG v1r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

CASA-ND-000690 - The Cisco ASA must be configured to terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after five minutes of inactivity except to fulfill documented and validated mission requirements.DISA STIG Cisco ASA NDM v2r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000720 - The Cisco router must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA STIG Cisco IOS XE Router NDM v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CISC-ND-000720 - The Cisco switch must be configured to terminate all network connections associated with device management after five minutes of inactivity.DISA STIG Cisco IOS Switch NDM v3r1Cisco

SYSTEM AND COMMUNICATIONS PROTECTION

CNTR-R2-000890 Rancher RKE2 must terminate all network connections associated with a communications session at the end of the session, or as follows: for in-band management sessions (privileged sessions), the session must be terminated after five minutes of inactivity.DISA Rancher Government Solutions RKE2 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000041 - The system must set a timeout to automatically disable idle sessions after a predetermined period.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000042 - The system must terminate shell services after a predetermined period.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-06-000043 - The system must logout of the console UI after a predetermined period.DISA STIG VMware vSphere 6.x ESXi v1r5VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000041 - The ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000042 - The ESXi host must terminate shell services after 10 minutes.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-67-000043 - The ESXi host must log out of the console UI after two minutes.DISA STIG VMware vSphere 6.7 ESXi v1r3VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000041 - The ESXi host must set a timeout to automatically disable idle shell sessions after two minutes.DISA STIG VMware vSphere 7.0 ESXi v1r2VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-70-000043 - The ESXi host must log out of the console UI after two minutes.DISA STIG VMware vSphere 7.0 ESXi v1r2VMware

SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000068 The ESXi host must set a timeout to automatically end idle shell sessions after fifteen minutes.DISA VMware vSphere 8.0 ESXi STIG v2r1VMware

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

ESXI-80-000195 The ESXi host must automatically stop shell services after 10 minutes.DISA VMware vSphere 8.0 ESXi STIG v2r1VMware

SYSTEM AND COMMUNICATIONS PROTECTION

OL07-00-040160 - The Oracle Linux operating system must be configured so that all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA Oracle Linux 7 STIG v2r14Unix

SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010200 - OL 8 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Oracle Linux 8 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-010201 - OL 8 must be configured so that all network connections associated with SSH traffic are terminated after 10 minutes of becoming unresponsive.DISA Oracle Linux 8 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

OL08-00-020035 - OL 8 must terminate idle user sessions.DISA Oracle Linux 8 STIG v2r2Unix

SYSTEM AND COMMUNICATIONS PROTECTION

PHTN-67-000039 - The Photon operating system must configure sshd to disconnect idle SSH sessions.DISA STIG VMware vSphere 6.7 Photon OS v1r6Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-08-020035 - RHEL 8.7 and higher must terminate idle user sessions.DISA Red Hat Enterprise Linux 8 STIG v2r1Unix

SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-255095 - RHEL 9 must be configured so that all network connections associated with SSH traffic terminate after becoming unresponsive.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

RHEL-09-412035 - RHEL 9 must automatically exit interactive command shell user sessions after 15 minutes of inactivity.DISA Red Hat Enterprise Linux 9 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010280 - The SUSE operating system SSH daemon must be configured with a timeout interval.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SLES-15-010320 - The SUSE operating system for all network connections associated with SSH traffic must immediately terminate at the end of the session or after 10 minutes of inactivity.DISA SLES 15 STIG v2r2Unix

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-AG-000440 - Symantec ProxySG must terminate all network connections associated with a communications session at the end of the session or terminate user sessions (nonprivileged session) after 15 minutes of inactivity.DISA Symantec ProxySG Benchmark ALG v1r3BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - cli timeoutDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

SYMP-NM-000310 - Symantec ProxySG must terminate all network connections associated with a device management session at the end of the session, or the session must be terminated after 10 minutes of inactivity except to fulfill documented and validated mission requirements - web timeoutDISA Symantec ProxySG Benchmark NDM v1r2BlueCoat

SYSTEM AND COMMUNICATIONS PROTECTION

VCTR-67-000002 - The vCenter Server must not automatically refresh client sessions.DISA STIG VMware vSphere 6.7 vCenter v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000002 - The system must not automatically refresh client sessions.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

VCWN-06-000004 - The system must terminate management sessions after 10 minutes of inactivity.DISA STIG VMware vSphere vCenter 6.x v1r4VMware

SYSTEM AND COMMUNICATIONS PROTECTION

WN11-SO-000070 - The machine inactivity limit must be set to 15 minutes, locking the system with the screensaver.DISA Windows 11 STIG v2r2Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION

WN22-DC-000160 - Windows Server 2022 directory service must be configured to terminate LDAP-based network connections to the directory server after five minutes of inactivity.DISA Windows Server 2022 STIG v2r2Windows

ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION