5.006 - The system configuration is not set with a password-protected screen saver. - ScreenSaveActive | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
5.006 - The system configuration is not set with a password-protected screen saver. - ScreenSaverIsSecure | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
5.006 - The system configuration is not set with a password-protected screen saver. - ScreenSaveTimeOut | DISA Windows Vista STIG v6r41 | Windows | ACCESS CONTROL |
AIX7-00-001028 - AIX must provide the lock command to let users retain their session lock until users are reauthenticated. | DISA STIG AIX 7.x v2r9 | Unix | ACCESS CONTROL |
AIX7-00-001029 - AIX must provide xlock command in the CDE environment to let users retain their sessions lock until users are reauthenticated. | DISA STIG AIX 7.x v2r9 | Unix | ACCESS CONTROL |
AOSX-13-000007 - The macOS system must be configured to prevent Apple Watch from terminating a session lock. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL |
AOSX-13-000020 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL |
AOSX-13-000025 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started. | DISA STIG Apple Mac OSX 10.13 v2r5 | Unix | ACCESS CONTROL |
AOSX-14-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL |
AOSX-14-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL |
AOSX-14-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started. | DISA STIG Apple Mac OSX 10.14 v2r6 | Unix | ACCESS CONTROL |
AOSX-15-000001 - The macOS system must be configured to prevent Apple Watch from terminating a session lock. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL |
AOSX-15-000002 - The macOS system must retain the session lock until the user reestablishes access using established identification and authentication procedures. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL |
AOSX-15-000003 - The macOS system must initiate the session lock no more than five seconds after a screen saver is started. | DISA STIG Apple Mac OSX 10.15 v1r10 | Unix | ACCESS CONTROL |
OL07-00-010060 - The Oracle Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures. | DISA Oracle Linux 7 STIG v2r14 | Unix | ACCESS CONTROL |
OL08-00-020039 - OL 8 must have the tmux package installed. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
OL08-00-020040 - OL 8 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for command line sessions. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
OL08-00-020041 - OL 8 must ensure session control is automatically started at shell initialization. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
OL08-00-020042 - OL 8 must prevent users from disabling session control mechanisms. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
OL08-00-020043 - OL 8 must enable a user session lock until that user reestablishes access using established identification and authentication procedures for command line sessions. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
OL08-00-020050 - OL 8 must be able to initiate directly a session lock for all connection types using smartcard when the smartcard is removed. | DISA Oracle Linux 8 STIG v2r1 | Unix | ACCESS CONTROL |
RHEL-07-010060 - The Red Hat Enterprise Linux operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures. | DISA Red Hat Enterprise Linux 7 STIG v3r15 | Unix | ACCESS CONTROL |
RHEL-09-271045 - RHEL 9 must be able to initiate directly a session lock for all connection types using smart card when the smart card is removed. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271050 - RHEL 9 must prevent a user from overriding the disabling of the graphical user smart card removal action. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271055 - RHEL 9 must enable a user session lock until that user re-establishes access using established identification and authentication procedures for graphical user sessions. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
RHEL-09-271060 - RHEL 9 must prevent a user from overriding the screensaver lock-enabled setting for the graphical user interface. | DISA Red Hat Enterprise Linux 9 STIG v2r2 | Unix | ACCESS CONTROL |
SLES-12-010060 - The SUSE operating system must be able to lock the graphical user interface (GUI). | DISA SLES 12 STIG v2r13 | Unix | ACCESS CONTROL |
SLES-12-010070 - The SUSE operating system must utilize vlock to allow for session locking. | DISA SLES 12 STIG v2r13 | Unix | ACCESS CONTROL |
SLES-15-010100 - The SUSE operating system must be able to lock the graphical user interface (GUI). | DISA SLES 15 STIG v2r1 | Unix | ACCESS CONTROL |
SLES-15-010110 - The SUSE operating system must utilize vlock to allow for session locking. | DISA SLES 15 STIG v2r1 | Unix | ACCESS CONTROL |
SOL-11.1-040170 - The system must require users to re-authenticate to unlock a graphical desktop environment. | DISA STIG Solaris 11 SPARC v3r1 | Unix | ACCESS CONTROL |
SOL-11.1-040170 - The system must require users to re-authenticate to unlock a graphical desktop environment. | DISA STIG Solaris 11 X86 v3r1 | Unix | ACCESS CONTROL |
UBTU-16-010040 - The Ubuntu operating system must enable a user session lock until that user re-establishes access using established identification and authentication procedures. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | ACCESS CONTROL |
UBTU-16-010050 - All users must be able to directly initiate a session lock for all connection types. | DISA STIG Ubuntu 16.04 LTS v2r3 | Unix | ACCESS CONTROL |
UBTU-18-010401 - The Ubuntu operating system must retain a users session lock until that user reestablishes access using established identification and authentication procedures. | DISA STIG Ubuntu 18.04 LTS v2r15 | Unix | ACCESS CONTROL |
UBTU-20-010004 - The Ubuntu operating system must retain a user's session lock until that user reestablishes access using established identification and authentication procedures. | DISA STIG Ubuntu 20.04 LTS v2r1 | Unix | ACCESS CONTROL |
WN10-CC-000365 - Windows 10 must be configured to prevent Windows apps from being activated by voice while the system is locked. | DISA Windows 10 STIG v3r2 | Windows | ACCESS CONTROL |
WN12-UC-000003 - The screen saver must be password protected. | DISA Windows Server 2012 and 2012 R2 DC STIG v3r7 | Windows | ACCESS CONTROL |
WN12-UC-000003 - The screen saver must be password protected. | DISA Windows Server 2012 and 2012 R2 MS STIG v3r7 | Windows | ACCESS CONTROL |
WN19-SO-000120 - Windows Server 2019 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver. | DISA Windows Server 2019 STIG v3r2 | Windows | ACCESS CONTROL |
WN22-SO-000120 - Windows Server 2022 machine inactivity limit must be set to 15 minutes or less, locking the system with the screen saver. | DISA Windows Server 2022 STIG v2r2 | Windows | ACCESS CONTROL |