STIGQter STIGQter: STIG Summary: Forescout Network Device Management Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 20 Nov 2020:

Forescout must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services.

DISA Rule

SV-230959r615886_rule

Vulnerability Number

V-230959

Group Title

SRG-APP-000142-NDM-000245

Rule Version

FORE-NM-000330

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

Configure the network device to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services. The following is an example of disabling the wireless plugin if no wireless devices are directly managed by Forescout.

Example ONLY:

1. Connect to the Forescout Console and select Tools >> Options >> Modules >> Network.
2. Determine if the wireless plugin is running. If it is running, click the option and click "Stop". If the user is logged in to the enterprise manager, this will stop it on all the appliances in the enterprise.

This process can be used to disable or remove plugins not being used.

Check Contents

Navigate to the plugin tool and remove all unneeded or unsecure services.

1. Connect to the Forescout Console and select Tools >> Options >> Plugins.
2. Review the list of plugins. If an unnecessary or nonsecure service is "Enabled", select the plugin and then select "Configure".

If no configuration is present, this is a finding.

If any unnecessary or nonsecure functions are enabled, this is a finding.

Vulnerability Number

V-230959

Documentable

False

Rule Version

FORE-NM-000330

Severity Override Guidance

Navigate to the plugin tool and remove all unneeded or unsecure services.

1. Connect to the Forescout Console and select Tools >> Options >> Plugins.
2. Review the list of plugins. If an unnecessary or nonsecure service is "Enabled", select the plugin and then select "Configure".

If no configuration is present, this is a finding.

If any unnecessary or nonsecure functions are enabled, this is a finding.

Check Content Reference

M

Target Key

5245

Comments