Audits
Settings
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Theme
Light
Dark
Auto
Help
Plugins
Overview
Plugins Pipeline
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Release Notes
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Links
Tenable Cloud
Tenable Community & Support
Tenable University
Settings
Theme
Light
Dark
Auto
Detections
Plugins
Overview
Plugins Pipeline
Release Notes
Newest
Updated
Search
Nessus Families
WAS Families
NNM Families
LCE Families
Tenable OT Security Families
About Plugin Families
Audits
Overview
Newest
Updated
Search Audit Files
Search Items
References
Authorities
Documentation
Download All Audit Files
Indicators
Overview
Search
Indicators of Attack
Indicators of Exposure
Analytics
CVEs
Overview
Newest
Updated
Search
Attack Path Techniques
Overview
Search
Audits
Item Search
Audits
Item Search
Filters (1)
Description
Filename
Plugin
References
Control ID
Relevance
Description
Plugin
Filename
References (Active)
Search by References
Clear All
‹‹ Previous
Previous
Page 3 of 5
• 218 Total
Next
Next ››
Name
Audit Name
Plugin
Category
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types
DISA STIG AIX 7.x v2r8
Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/lock
DISA STIG AIX 7.x v2r5
Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/lock
DISA STIG AIX 7.x v2r6
Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/X11/xlock
DISA STIG AIX 7.x v2r5
Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/X11/xlock
DISA STIG AIX 7.x v2r6
Unix
AOSX-12-030014 - The OS X system must be configured to lock the user session when a smart token is removed.
DISA STIG Apple Mac OSX 10.12 v1r6
Unix
CONFIGURATION MANAGEMENT
AOSX-15-000005 - The macOS system must be configured to lock the user session when a smart token is removed.
DISA STIG Apple Mac OSX 10.15 v1r8
Unix
APPL-12-000005 - The macOS system must be configured to lock the user session when a smart token is removed.
DISA STIG Apple macOS 12 v1r9
Unix
ACCESS CONTROL
F5BI-LT-000143 - The BIG-IP Core implementation providing user access control intermediary services must provide the capability for users to directly initiate a session lock.
DISA F5 BIG-IP Local Traffic Manager 11.x STIG v2r1
F5
ACCESS CONTROL
OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.
DISA STIG Oracle Linux 6 v2r6
Unix
OL08-00-020030 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for graphical user sessions.
DISA Oracle Linux 8 STIG v1r10
Unix
OL08-00-020039 - OL 8 must have the tmux package installed.
DISA Oracle Linux 8 STIG v1r7
Unix
OL08-00-020039 - OL 8 must have the tmux package installed.
DISA Oracle Linux 8 STIG v1r10
Unix
OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.
DISA Oracle Linux 8 STIG v1r4
Unix
OL08-00-020041 - OL 8 must ensure session control is automatically started at shell initialization - tmux script
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-020041 - OL 8 must ensure session control is automatically started at shell initialization - tmux shell
DISA Oracle Linux 8 STIG v1r6
Unix
OL08-00-020042 - OL 8 must prevent users from disabling session control mechanisms.
DISA Oracle Linux 8 STIG v1r7
Unix
OL08-00-020042 - OL 8 must prevent users from disabling session control mechanisms.
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-020043 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for command line sessions.
DISA Oracle Linux 8 STIG v1r9
Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.
DISA Oracle Linux 8 STIG v1r8
Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.
DISA Oracle Linux 8 STIG v1r1
Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.
DISA Oracle Linux 8 STIG v1r2
Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.
DISA Oracle Linux 8 STIG v1r4
Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.
DISA Oracle Linux 8 STIG v1r6
Unix
RHEL-09-271045 - RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed.
DISA Red Hat Enterprise Linux 9 STIG v1r2
Unix
RHEL-09-271050 - RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action.
DISA Red Hat Enterprise Linux 9 STIG v1r1
Unix
RHEL-09-271055 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.
DISA Red Hat Enterprise Linux 9 STIG v1r3
Unix
RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.
DISA Red Hat Enterprise Linux 9 STIG v1r1
Unix
RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.
DISA Red Hat Enterprise Linux 9 STIG v1r3
Unix
RHEL-09-412010 - RHEL 9 must have the tmux package installed.
DISA Red Hat Enterprise Linux 9 STIG v1r1
Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).
DISA SLES 15 STIG v1r9
Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).
DISA SLES 15 STIG v1r11
Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).
DISA SLES 15 STIG v1r13
Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).
DISA SLES 15 STIG v1r12
Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).
DISA SLES 15 STIG v1r6
Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.
DISA SLES 15 STIG v1r12
Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.
DISA SLES 15 STIG v1r10
Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.
DISA SLES 15 STIG v1r9
Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.
DISA SLES 15 STIG v1r6
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 SPARC v2r10
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 X86 v2r7
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 X86 v2r10
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 X86 v2r9
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 SPARC v2r2
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 SPARC v2r4
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 SPARC v2r7
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 X86 v2r4
Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.
DISA STIG Solaris 11 X86 v2r8
Unix
UBTU-22-412025 - Ubuntu 22.04 LTS must allow users to directly initiate a session lock for all connection types.
DISA STIG Canonical Ubuntu 22.04 LTS v1r1
Unix
‹‹ Previous
Previous
Page 3 of 5
• 218 Total
Next
Next ››