STIGQter STIGQter: STIG Summary: ForeScout CounterACT NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 12 Sep 2017:

CounterACT must restrict the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrators role or to other roles or individuals.

DISA Rule

SV-90931r1_rule

Vulnerability Number

V-76243

Group Title

SRG-APP-000353-NDM-000292

Rule Version

CACT-NM-000005

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure CounterACT to restrict the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrator's role or to other roles or individuals.

Apply the following configuration changes:

1. Open the CounterACT Administrator Console and log on with admin or operator credentials.
2. Select Tools >> Options >> Console User Profiles.
3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit".
4. Review the "Permissions" tab and ensure the following "update" radio check boxes are enabled: Action Thresholds, CounterACT Appliance Configuration, and Enterprise Manager Control.

Check Contents

Determine if CounterACT restricts the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrator's role or to other roles or individuals.

This requirement may be verified by configuration review or demonstration.

1. Open the CounterACT Administrator Console and log on with admin or operator credentials.
2. Select Tools >> Options >> Console User Profiles.
3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit".
4. Review the "Permissions" tab and verify the following "update" radio check boxes are enabled: Action Thresholds, CounterACT Appliance Configuration, and Enterprise Manager Control.

If CounterACT does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near real time, this is a finding.

Vulnerability Number

V-76243

Documentable

False

Rule Version

CACT-NM-000005

Severity Override Guidance

Determine if CounterACT restricts the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrator's role or to other roles or individuals.

This requirement may be verified by configuration review or demonstration.

1. Open the CounterACT Administrator Console and log on with admin or operator credentials.
2. Select Tools >> Options >> Console User Profiles.
3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit".
4. Review the "Permissions" tab and verify the following "update" radio check boxes are enabled: Action Thresholds, CounterACT Appliance Configuration, and Enterprise Manager Control.

If CounterACT does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near real time, this is a finding.

Check Content Reference

M

Target Key

3225

Comments