Free Tool: 8.1.8: Idle Sessions

Require user re-authentication after a session has been idle for more than 15 minutes


Action1 Customers
8.1.8: Idle Sessions   Require user re-authentication after a session has been idle for more than 15 minutes

Users walking away from their computers without locking their computers present a great risk of unauthorized cardholder data access, because any data stored on user’s workstation can be accessed in their absence by anyone who has physical access at that time.

This Action1 query verifies the endpoint configuration to ensure that required settings are in place to enforce the right logon session behavior that requires re-authentication after 15 minutes of inactivity.

Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on 8.1.8: Idle Sessions created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.


Endpoint configuration management in the Cloud

Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'.
Get results instantly from live systems and run automated actions.

8.1.8: Idle Sessions

Related Alerts and Reports:

8.1.1: Assign Unique User IDs
    All users must be assigned a unique ID before granting them access to cardholder data
8.1.2: Management of User IDs
    Control addition, deletion, and modification of user ID, credentials and other identifier objects
8.1.3: Revoke Access for Terminated Employees
    Ensure that any terminated users lose their access to corporate systems
8.1.4: Inactive User Accounts
    Remove or disable user accounts that have been inactive for over 90 days
8.1.5: Third Party Accounts
    Enable third-party vendor accounts only when needed and monitor when in use
8.1.6: Account Lockouts
    Limit multiple invalid login attempts by locking out the user ID after 6 attempts
8.1.7: Account Lockout Duration
    The lockout duration must be at least 30 minutes or until re-enabled by administrator

Find more information on 8.1.8: Idle Sessions at Microsoft TechNet.