1.1.3.11.17 Configure 'Network security: Force logoff when logon hours expire' | CIS Windows 8 L1 v1.0.0 | Windows | ACCESS CONTROL |
2.3.9.1 Ensure 'Microsoft network server: Amount of idle time required before suspending session' is set to '15 or fewer minute(s)' | CIS Windows 7 Workstation Level 1 + Bitlocker v3.2.0 | Windows | ACCESS CONTROL |
2.3.11.6 Ensure 'Network security: Force logoff when logon hours expire' is set to 'Enabled' | CIS Windows 7 Workstation Level 1 v3.2.0 | Windows | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Oracle Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Amazon Linux 2 v3.0.0 L1 | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 7 v4.0.0 L1 Workstation | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS CentOS Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.2.13 Ensure sshd LoginGraceTime is configured | CIS Oracle Linux 7 v4.0.0 L1 Server | Unix | ACCESS CONTROL |
4.19 listener.ora - 'inbound_connect_timeout_listener = 2' | CIS v1.1.0 Oracle 11g OS L2 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
4.19 listener.ora - 'inbound_connect_timeout_listener = 2' | CIS v1.1.0 Oracle 11g OS Windows Level 2 | Windows | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
5.1.13 Ensure sshd LoginGraceTime is configured | CIS Ubuntu Linux 22.04 LTS v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.13 Ensure sshd LoginGraceTime is configured | CIS Ubuntu Linux 24.04 LTS v1.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.13 Ensure sshd LoginGraceTime is configured | CIS Debian Linux 12 v1.1.0 L1 Workstation | Unix | ACCESS CONTROL |
5.1.13 Ensure sshd LoginGraceTime is configured | CIS Debian Linux 12 v1.1.0 L1 Server | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS AlmaLinux OS 9 v2.0.0 L1 Server | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS Rocky Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
5.1.14 Ensure sshd LoginGraceTime is configured | CIS Oracle Linux 9 v2.0.0 L1 Workstation | Unix | ACCESS CONTROL |
6.3 Ensure that SharePoint user sessions are terminated upon user logoff and when the idle time limit is exceeded | CIS Microsoft SharePoint 2016 OS v1.1.0 | Windows | ACCESS CONTROL |
18.9.59.3.10.1 Ensure 'Set time limit for active but idle Remote Desktop Services sessions' is set to 'Enabled: 15 minutes or less' | CIS Windows 7 Workstation Level 2 v3.2.0 | Windows | ACCESS CONTROL |
18.9.59.3.10.2 Ensure 'Set time limit for disconnected sessions' is set to 'Enabled: 1 minute' | CIS Windows 7 Workstation Level 2 v3.2.0 | Windows | ACCESS CONTROL |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Big Sur - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Big Sur v1.4.0 - CNSSI 1253 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Catalina - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Catalina v1.5.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Microsoft network server: Amount of idle time required before suspending session | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Amount of idle time required before suspending session | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Amount of idle time required before suspending session | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Disconnect clients when logon hours expire | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
Microsoft network server: Disconnect clients when logon hours expire | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-171 | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r4 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - All Profiles | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 Moderate | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Monterey - Configure SSH ServerAliveInterval option set to 900 or less | NIST macOS Monterey v1.0.0 - 800-53r5 High | Unix | ACCESS CONTROL, SYSTEM AND COMMUNICATIONS PROTECTION |
Network security: Force logoff when logon hours expire | MSCT Windows 10 v1507 v1.0.0 | Windows | ACCESS CONTROL |
Network security: Force logoff when logon hours expire | MSCT Windows Server 2012 R2 MS v1.0.0 | Windows | ACCESS CONTROL |
Network security: Force logoff when logon hours expire | MSCT Windows Server 2016 MS v1.0.0 | Windows | ACCESS CONTROL |
Network security: Force logoff when logon hours expire | MSCT Windows Server 2012 R2 DC v1.0.0 | Windows | ACCESS CONTROL |
SCM Windows Server 2016 - Domain Controller Baseline: Policy Template: ForceLogoffWhenHourExpire | MSCT Windows Server 2016 DC v1.0.0 | Windows | ACCESS CONTROL |