An error occurred:
Close sidebar
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Xylok
Home Menu
info@xylok.io
© 2025
Xylok, LLC
Version: releases-v2025.04.2-01be-daa4
Open sidebar
Navigate
Top
Search
Checks (
217
)
Print
Changes
Pages (
8/15
)
Solaris 11 SPARC STIG
Solaris 11 SPARC Security Technical Implementation Guide
v3 r2 (Released Jan. 30, 2025)
v3 r1 (Released July 24, 2024)
v2 r10 (Released April 24, 2024)
v2 r9 (Released Jan. 24, 2024)
v2 r8 (Released July 26, 2023)
v2 r7 (Released Jan. 26, 2023)
v2 r6 (Released Jan. 27, 2022)
v2 r5 (Released Oct. 27, 2021)
v2 r4 (Released July 23, 2021)
v2 r3 (Released April 23, 2021)
v2 r2 (Released Jan. 22, 2021)
v2 r1 (Released Oct. 23, 2020)
v1 r22 (Released July 24, 2020)
v1 r21 (Released April 24, 2020)
v1 r20 (Released Jan. 24, 2020)
v1 r19 (Released Oct. 25, 2019)
v1 r18 (Released July 26, 2019)
v1 r17 (Released April 26, 2019)
v1 r16 (Released Oct. 26, 2018)
v1 r15 (Released July 27, 2018)
v1 r13 (Released Oct. 27, 2017)
v1 r12 (Released July 28, 2017)
v1 r11 (Released April 28, 2017)
v1 r14 (Released April 27, 2017)
v1 r10 (Released Jan. 27, 2017)
ID
Vuln ID
Title
Cat
Status
SOL-11.1-040380
V-216356
The operating system must terminate the network connection associated with a communications session at the end of the session or after 10 minutes of inactivity.
Cat III
SOL-11.1-040390
V-216357
Host-based authentication for login-based services must be disabled.
Cat II
SOL-11.1-040400
V-216358
The use of FTP must be restricted.
Cat II
SOL-11.1-040410
V-216359
The system must not allow autologin capabilities from the GNOME desktop.
Cat I
SOL-11.1-040420
V-216360
Unauthorized use of the at or cron capabilities must not be permitted.
Cat II
SOL-11.1-040430
V-216361
Logins to the root account must be restricted to the system console only.
Cat II
SOL-11.1-040450
V-216362
The operating system, upon successful logon, must display to the user the date and time of the last logon (access).
Cat III
SOL-11.1-040460
V-216363
The operating system must provide the capability for users to directly initiate session lock mechanisms.
Cat II
SOL-11.1-040470
V-216364
The operating system session lock mechanism, when activated on a device with a display screen, must place a publicly viewable pattern onto the associated display, hiding what was previously visible on the screen.
Cat II
SOL-11.1-040480
V-216365
The operating system must not allow logins for users with blank passwords.
Cat I
SOL-11.1-040490
V-216366
The operating system must prevent remote devices that have established a non-remote connection with the system from communicating outside of the communication path with resources in external networks.
Cat II
SOL-11.1-040500
V-216367
The operating system must limit the number of concurrent sessions for each account to an organization-defined number of sessions.
Cat III
SOL-11.1-050010
V-216368
The system must disable directed broadcast packet forwarding.
Cat III
SOL-11.1-050020
V-216369
The system must not respond to ICMP timestamp requests.
Cat III
SOL-11.1-050030
V-216370
The system must not respond to ICMP broadcast timestamp requests.
Cat III
Prev
1...
4
5
6
7
8
9
10
11
12
...15
Next
Print
Display this benchmark in a printer-friendly format for off-line reference. This display does not include any commands.
Version Changes
If there are multiple versions of this benchmark, Xylok can display the differences between any changes in the checks.