ForeScout CounterACT ALG Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Supporting documents 3 PDFs
Bundled by DISA alongside this STIG release: overview, revision history, and readme files. Download the full archive or open an individual PDF.
Digest of Updates +13 −12
Comparison against the immediately-prior release (V1R2). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 13
- V-237572 Medium CounterACT, when providing user access control intermediary services, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
- V-237573 Low CounterACT, when providing user access control intermediary services, must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-237574 Medium CounterACT, when providing user access control intermediary services for publicly accessible applications, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
- V-237575 Medium CounterACT must send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
- V-237576 Medium If user authentication services are provided, CounterACT must be configured with a pre-established trust relationship and mechanisms with a central directory service that validates user account access authorizations and privileges.
- V-237577 Medium If user authentication services are provided, CounterACT must restrict user authentication traffic to specific authentication server(s).
- V-237578 Medium CounterACT, when providing user authentication intermediary services, must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
- V-237579 Medium CounterACT must off-load audit records onto a centralized log server.
- V-237580 Medium CounterACT, when providing user authentication intermediary services, must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- V-237581 Medium CounterACT, when providing user authentication intermediary services, must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-237582 Medium CounterACT must off-load audit records onto a centralized log server in real time.
- V-237583 Medium CounterACT must use an Enterprise Manager or other high availability solution to ensure redundancy in case of audit failure in this critical network access control and security service.
- V-265638 High The version of ForeScout CounterAct must be a supported version.
Removed rules 12
- V-75913 Medium CounterACT, when providing user access control intermediary services, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network.
- V-75931 Low CounterACT, when providing user access control intermediary services, must retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access.
- V-75933 Medium CounterACT, when providing user access control intermediary services for publicly accessible applications, must display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system.
- V-75935 Medium CounterACT must send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs.
- V-75937 Medium If user authentication services are provided, CounterACT must be configured with a pre-established trust relationship and mechanisms with a central directory service that validates user account access authorizations and privileges.
- V-75939 Medium If user authentication services are provided, CounterACT must restrict user authentication traffic to specific authentication server(s).
- V-75941 Medium CounterACT, when providing user authentication intermediary services, must implement replay-resistant authentication mechanisms for network access to non-privileged accounts.
- V-75943 Medium CounterACT must off-load audit records onto a centralized log server.
- V-76185 Medium CounterACT, when providing user authentication intermediary services, must require users to reauthenticate when organization-defined circumstances or situations require reauthentication.
- V-76187 Medium CounterACT, when providing user authentication intermediary services, must implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
- V-76189 Medium CounterACT must off-load audit records onto a centralized log server in real time.
- V-76191 Medium CounterACT must use an Enterprise Manager or other high availability solution to ensure redundancy in case of audit failure in this critical network access control and security service.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- CACT-AG-000001
- Vuln IDs
-
- V-237572
- V-75913
- Rule IDs
-
- SV-237572r645654_rule
- SV-90593
Checks: C-40791r645652_chk
If CounterACT does not provide user access control intermediary services, this is not applicable. Verify CounterACT displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network. 1. Log on to CounterACT’s Administrator UI. 2. Go to Tools >> Options >> User Console and Options >> Password and Logon. 3. Enable the "Display this Notice and Consent Message after login" and complete the provided text input area to have the Standard Mandatory DoD and Consent Banner before granting access to the device. This banner must include the following text: By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If CounterACT does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network, this is a finding.
Fix: F-40754r645653_fix
If user network access control intermediary services are provided, configure CounterACT to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the network. 1. Log in to CounterACT’s Administrator UI. 2. Go to Tools >> Options >> User Console and Options >> Password and Logon. 3. Enable the "Display this Notice and Consent Message after login" and complete the provided text input area to have the Standard Mandatory DoD and Consent Banner before granting access to the device. This banner must include the following text: By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- CACT-AG-000002
- Vuln IDs
-
- V-237573
- V-75931
- Rule IDs
-
- SV-237573r645657_rule
- SV-90619
Checks: C-40792r645655_chk
If CounterACT does not provide user access control intermediary services, this is not applicable. Verify CounterACT retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. 1. Log in to CounterACT’s Administrator UI. 2. Go to Tools >> Options >> User Console and Options >> Password and Logon. 3. Verify the options for logon banner "require confirmation" is selected. If CounterACT does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
Fix: F-40755r645656_fix
If user access control intermediary services are provided, configure CounterACT to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. 1. Log on to CounterACT’s Administrator UI. 2. Go to Tools >> Options >> User Console and Options >> Password and Logon. 3. Ensure the options for the logon banner "require confirmation" is selected.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-001384
- Version
- CACT-AG-000003
- Vuln IDs
-
- V-237574
- V-75933
- Rule IDs
-
- SV-237574r645660_rule
- SV-90621
Checks: C-40793r645658_chk
If CounterACT does not provide user access control intermediary services, this is not applicable. Verify CounterACT displays the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system. 1. Log on to CounterACT’s Administrator UI. 2. Go to Tools >> Options >> User Console and Options >> Password and Logon. 3. Enable the "Display this Notice and Consent Message after login" and complete the provided text input area to have the Standard Mandatory DoD and Consent Banner before granting access to the device. This banner must include the following text: By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details." If CounterACT does not display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system, this is a finding.
Fix: F-40756r645659_fix
If user access control intermediary services are provided, configure CounterACT to display the Standard Mandatory DoD-approved Notice and Consent Banner before granting access to the system. 1. Log on to CounterACT’s Administrator UI. 2. Go to Tools >> Options >> User Console and Options >> Password and Logon. 3. Enable the "Display this Notice and Consent Message after login" and complete the provided text input area to have the Standard Mandatory DoD and Consent Banner before granting access to the device. This banner must include the following text: By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000139
- Version
- CACT-AG-000004
- Vuln IDs
-
- V-237575
- V-75935
- Rule IDs
-
- SV-237575r645663_rule
- SV-90623
Checks: C-40794r645661_chk
Verify CounterACT sends an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs. 1. Log in to the CounterACT Administrator interface. 2. Select Tools >> Options. 3. Select General. 4. Select the "+" next to general to open the submenu. Select email Preferences. 5. Ensure that the ISSO/SCA email address is configuration for notifications. If CounterACT does not send an alert to, at a minimum, the ISSO and SCA when an audit processing failure occurs, this is a finding.
Fix: F-40757r645662_fix
Configure CounterACT to send all alert notifications to, at a minimum, the ISSO and SCA when an audit processing failure occurs. 1. Log in to CounterACT’s Administrator interface. 2. Select Tools >> Options. 3. Select General. 4. Select the "+" next to general to open the submenu. Select email Preferences. 5. Ensure that the ISSO/SCA email address is configuration for notifications.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- CACT-AG-000006
- Vuln IDs
-
- V-237576
- V-75937
- Rule IDs
-
- SV-237576r645666_rule
- SV-90625
Checks: C-40795r645664_chk
If CounterACT does not provide user authentication intermediary services, this is not applicable. Verify CounterACT is configured for NAC services authentication. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Verify the User Directory configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected. Verify with site representatives that the directory service validates user account access authorizations and privileges. If CounterACT does not use a central directory service to validate user account access authorizations and privileges, this is a finding.
Fix: F-40758r645665_fix
If user authentication service is provided by CounterACT, configure the use of a central directory service for user authentication. Obtain configuration information for a directory service (e.g., Active Directory or LDAP) that validates user account access authorizations and privileges. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Verify the User Directory configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-000764
- Version
- CACT-AG-000007
- Vuln IDs
-
- V-237577
- V-75939
- Rule IDs
-
- SV-237577r645669_rule
- SV-90627
Checks: C-40796r645667_chk
If CounterACT does not provide user authentication intermediary services, this is not applicable. Verify CounterACT is configured to use a specific authentication server(s). 1. Connect to the CounterACT Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Verify the User Directory is configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected. 4. Verify the Hostname is correct for the assigned directory and then select "OK". (Select "Apply" if changes were made.) 5. Select the directory and then select test. Verify both tests past. If CounterACT does not restrict user authentication traffic to a specific authentication server(s), this is a finding.
Fix: F-40759r645668_fix
If user authentication service is provided by CounterACT, configure the use of a central directory service for user authentication. 1. Connect to the CounterACT Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Ensure the User Directory configured for Authentication. Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected. 4. Ensure the Hostname is correct for the assigned directory and then select "OK". (Select "Apply" if changes were made.) 5. Select the directory and then select test. Ensure both tests passed.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001942
- Version
- CACT-AG-000009
- Vuln IDs
-
- V-237578
- V-75941
- Rule IDs
-
- SV-237578r981631_rule
- SV-90629
Checks: C-40797r645670_chk
If CounterACT does not provide user authentication intermediary services, this is not applicable. Verify CounterACT is configured to implement replay-resistant authentication mechanisms for network access to non-privileged accounts. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Verify the User Directory is configured for secure methods of communication. On the Settings TAB ensure the "Use TLS" radio button is selected. If CounterACT does not implement replay-resistant authentication mechanisms for network access to non-privileged accounts, this is a finding.
Fix: F-40760r645671_fix
If user authentication intermediary services are provided, configure CounterACT to implement replay-resistant authentication mechanisms for network access to non-privileged accounts. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Ensure the User Directory is configured for secure methods of communication. On the Settings TAB ensure the "Use TLS" radio button is selected. 4. Select "OK". (Select "Apply" if changes were made.)
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CACT-AG-000010
- Vuln IDs
-
- V-237579
- V-75943
- Rule IDs
-
- SV-237579r831486_rule
- SV-90631
Checks: C-40798r645673_chk
Verify CounterACT off-loads audit records onto a centralized log server. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> Plugins >> Syslog. 3. Verify a Syslog server is configured in the "Send To" tab. 4. On the Events Filtering Tab, ensure all radio buttons associated with NAC Events, Threat Protection, System Logs, User Operations, and Operating System messages are selected. If CounterACT does not off-load audit records onto a centralized log server, this is a finding.
Fix: F-40761r645674_fix
Configure CounterACT to off-load audit records onto a centralized log server. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> Plugins >> Syslog. 3. Ensure a Syslog server is configured in the "Send To" tab. 4. On the Events Filtering Tab, ensure all radio buttons associated with NAC Events, Threat Protection, System Logs, User Operations, and Operating System messages are selected. 5. Select "OK". (Select "Apply" if changes were made.)
- RMF Control
- IA-11
- Severity
- M
- CCI
- CCI-002038
- Version
- CACT-AG-000011
- Vuln IDs
-
- V-237580
- V-76185
- Rule IDs
-
- SV-237580r987783_rule
- SV-90873
Checks: C-40799r645676_chk
If CounterACT does not provide user authentication intermediary services, this is not applicable. Verify CounterACT is configured to require users to reauthenticate when organization-defined circumstances or situations require reauthentication. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> 802.1x. 3. Select the Pre-Admission Authorization tab. 4. On each Rule that "Accepts", verify there is an Attribute "Session-Timeout" configured to the maximum session configuration, typically 60 minutes, but not more than 120. If CounterACT does not require users to reauthenticate when organization-defined circumstances or situations require reauthentication, this is a finding.
Fix: F-40762r645677_fix
If user access control intermediary services are provided, configure CounterACT to require users to reauthenticate when organization-defined circumstances or situations require reauthentication. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> 802.1x. 3. Select the Pre-Admission Authorization tab. 4. On each Rule that "Accepts", ensure there is an Attribute "Session-Timeout" configured to the maximum session configuration, typically 60 minutes, but not more than 120.
- RMF Control
- IA-2
- Severity
- M
- CCI
- CCI-001951
- Version
- CACT-AG-000012
- Vuln IDs
-
- V-237581
- V-76187
- Rule IDs
-
- SV-237581r981642_rule
- SV-90875
Checks: C-40800r645679_chk
If CounterACT does not provide user authentication intermediary services, this is not applicable. Verify CounterACT implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Verify the User Directory configured for Authentication uses Multi-Factor credentials Select the configured directory (or directories) and on the General Tab verify the "Use for Authentication" radio button is selected. 4. Verify the Hostname is correct for the assigned directory then select "OK". (Select "Apply" if changes were made.) If CounterACT does not implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access, this is a finding.
Fix: F-40763r645680_fix
If user authentication intermediary services are provided, configure CounterACT to implement multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> User Directory. 3. Ensure the User Directory configured for Authentication uses Multi-Factor credentials Select the configured directory (or directories) and on the General Tab ensure the "Use for Authentication" radio button is selected. 4. Ensure the Hostname is correct for the assigned directory then select "OK". (Select "Apply" if changes were made.)
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CACT-AG-000014
- Vuln IDs
-
- V-237582
- V-76189
- Rule IDs
-
- SV-237582r831489_rule
- SV-90877
Checks: C-40801r645682_chk
Verify CounterACT off-loads audit records onto a centralized log server in real time. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> Plugins >> Syslog. 3. Verify a Syslog server is configured in the "Send To" tab. 4. On the Events Filtering Tab, Verify all radio buttons associated with NAC Events, Threat Protection, System Logs, User Operations, and Operating systems messages are selected. If CounterACT does not off-load onto a centralized log server in real time, this is a finding.
Fix: F-40764r645683_fix
Configure CounterACT to off-load onto a centralized log server in real time. 1. Connect to CounterACT’s Admin Console and log in. 2. Go to Tools >> Options >> Plugins >> Syslog. 3. Ensure a Syslog server is configured in the "Send To" tab. 4. On the Events Filtering Tab, ensure all radio buttons associated with NAC Events, Threat Protection, System Logs, User Operations, and Operating systems messages are selected.
- RMF Control
- AU-5
- Severity
- M
- CCI
- CCI-000140
- Version
- CACT-AG-000026
- Vuln IDs
-
- V-237583
- V-76191
- Rule IDs
-
- SV-237583r645687_rule
- SV-90879
Checks: C-40802r645685_chk
Examine architecture documentation. Verify CounterACT implementation includes an Enterprise Manager combined with Appliances to ensure redundancy. It is also acceptable to have two appliances configured for redundancy. If CounterACT implementation does not include an Enterprise Manager combined with Appliances or a high availability solution to ensure redundancy, this is a finding.
Fix: F-40765r645686_fix
Design and install CounterACT implementation to include an Enterprise Manager combined with one or more Appliances or a high availability solution. The Appliances will associate with the enterprise Manager or the high availability solution.
- RMF Control
- SC-7
- Severity
- H
- CCI
- CCI-002409
- Version
- CACT-AG-999999
- Vuln IDs
-
- V-265638
- Rule IDs
-
- SV-265638r1001001_rule
Checks: C-69553r997798_chk
ForeScout CounterAct versions supported by this STIG (Version 8 and earlier) are no longer supported by the vendor. If the system is running any CounterAct version, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.