Item Search

NameAudit NamePluginCategory
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection typesDISA STIG AIX 7.x v2r8Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/lockDISA STIG AIX 7.x v2r5Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/lockDISA STIG AIX 7.x v2r6Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/X11/xlockDISA STIG AIX 7.x v2r5Unix
AIX7-00-001100 - AIX must be configured to allow users to directly initiate a session lock for all connection types - /usr/bin/X11/xlockDISA STIG AIX 7.x v2r6Unix
AOSX-12-030014 - The OS X system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.12 v1r6Unix

CONFIGURATION MANAGEMENT

AOSX-15-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple Mac OSX 10.15 v1r8Unix
APPL-12-000005 - The macOS system must be configured to lock the user session when a smart token is removed.DISA STIG Apple macOS 12 v1r9Unix

ACCESS CONTROL

F5BI-LT-000143 - The BIG-IP Core implementation providing user access control intermediary services must provide the capability for users to directly initiate a session lock.DISA F5 BIG-IP Local Traffic Manager 11.x STIG v2r1F5

ACCESS CONTROL

OL6-00-000071 - The system must be configured so all network connections associated with a communication session are terminated at the end of the session or after 15 minutes of inactivity from the user at a command prompt, except to fulfill documented and validated mission requirements.DISA STIG Oracle Linux 6 v2r6Unix
OL08-00-020030 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for graphical user sessions.DISA Oracle Linux 8 STIG v1r10Unix
OL08-00-020039 - OL 8 must have the tmux package installed.DISA Oracle Linux 8 STIG v1r7Unix
OL08-00-020039 - OL 8 must have the tmux package installed.DISA Oracle Linux 8 STIG v1r10Unix
OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Oracle Linux 8 STIG v1r1Unix
OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions.DISA Oracle Linux 8 STIG v1r4Unix
OL08-00-020041 - OL 8 must ensure session control is automatically started at shell initialization - tmux scriptDISA Oracle Linux 8 STIG v1r2Unix
OL08-00-020041 - OL 8 must ensure session control is automatically started at shell initialization - tmux shellDISA Oracle Linux 8 STIG v1r6Unix
OL08-00-020042 - OL 8 must prevent users from disabling session control mechanisms.DISA Oracle Linux 8 STIG v1r7Unix
OL08-00-020042 - OL 8 must prevent users from disabling session control mechanisms.DISA Oracle Linux 8 STIG v1r2Unix
OL08-00-020043 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for command line sessions.DISA Oracle Linux 8 STIG v1r9Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Oracle Linux 8 STIG v1r8Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Oracle Linux 8 STIG v1r1Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Oracle Linux 8 STIG v1r2Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Oracle Linux 8 STIG v1r4Unix
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed.DISA Oracle Linux 8 STIG v1r6Unix
RHEL-09-271045 - RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed.DISA Red Hat Enterprise Linux 9 STIG v1r2Unix
RHEL-09-271050 - RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
RHEL-09-271055 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions.DISA Red Hat Enterprise Linux 9 STIG v1r3Unix
RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface.DISA Red Hat Enterprise Linux 9 STIG v1r3Unix
RHEL-09-412010 - RHEL 9 must have the tmux package installed.DISA Red Hat Enterprise Linux 9 STIG v1r1Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 15 STIG v1r9Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 15 STIG v1r11Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 15 STIG v1r13Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 15 STIG v1r12Unix
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI).DISA SLES 15 STIG v1r6Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 15 STIG v1r12Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 15 STIG v1r10Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 15 STIG v1r9Unix
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking.DISA SLES 15 STIG v1r6Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 SPARC v2r10Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 X86 v2r7Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 X86 v2r10Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 X86 v2r9Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 SPARC v2r2Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 SPARC v2r4Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 SPARC v2r7Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 X86 v2r4Unix
SOL-11.1-040460 - The operating system must provide the capability for users to directly initiate session lock mechanisms.DISA STIG Solaris 11 X86 v2r8Unix
UBTU-22-412025 - Ubuntu 22.04 LTS must allow users to directly initiate a session lock for all connection types.DISA STIG Canonical Ubuntu 22.04 LTS v1r1Unix