STIGQter STIGQter: STIG Summary: ForeScout CounterACT NDM Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 12 Sep 2017:

The network device must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.

DISA Rule

SV-90943r1_rule

Vulnerability Number

V-76255

Group Title

SRG-APP-000516-NDM-000338

Rule Version

CACT-NM-000086

Severity

CAT III

CCI(s)

Weight

10

Fix Recommendation

Configure CounterACT to use an authentication server to access the device.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Directory.
3. Enable the selected authentication server.

Check Contents

Review the CounterACT configuration to determine if an authentication server is required to access the device.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Directory.
3. Verify the selected authentication server is enabled for GUI authentication.

If an authentication server is not configured for use by CounterACT, this is a finding.

Vulnerability Number

V-76255

Documentable

False

Rule Version

CACT-NM-000086

Severity Override Guidance

Review the CounterACT configuration to determine if an authentication server is required to access the device.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Directory.
3. Verify the selected authentication server is enabled for GUI authentication.

If an authentication server is not configured for use by CounterACT, this is a finding.

Check Content Reference

M

Target Key

3225

Comments