ForeScout CounterACT NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
Digest of Updates +39 −38
Comparison against the immediately-prior release (V1R1). Rule matching uses the Group Vuln ID. Content-change detection compares the rule’s description, check, and fix text after stripping inline markup — cosmetic-only edits aren’t flagged.
Added rules 39
- V-255624 Medium CounterACT must terminate all network connections associated with an Enterprise Manager Console session upon Exit, or session disconnection, or after 10 minutes of inactivity, except where prevented by documented and validated mission requirements.
- V-255625 Medium CounterACT must terminate all network connections associated with an SSH connection session upon Exit, session disconnection, or after 10 minutes of inactivity, except where prevented by documented and validated mission requirements.
- V-255626 Medium CounterACT must allow only authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media.
- V-255627 Medium CounterACT must restrict the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrators role or to other roles or individuals.
- V-255628 Medium CounterACT must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).
- V-255629 Medium CounterACT must enable Threat Protection notifications to alert security personnel to Cyber events detected by a CounterACT IAW CJCSM 6510.01B.
- V-255630 Low CounterACT must generate audit log events for a locally developed list of auditable events.
- V-255631 Medium CounterACT must enforce access restrictions associated with changes to the system components.
- V-255632 Medium Administrative accounts for device management must be configured on the authentication server and not the network device itself (except for the account of last resort).
- V-255633 Medium CounterACT must support organizational requirements to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
- V-255634 Low CounterACT must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
- V-255635 Medium CounterACT must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- V-255636 Medium CounterACT must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- V-255637 Medium For the local account, CounterACT must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- V-255638 Low CounterACT must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- V-255639 Low CounterACT must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- V-255640 Medium If any logs are stored locally which are not sent to the centralized audit server, CounterACT must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- V-255641 Medium CounterACT must limit privileges to change the software resident within software libraries.
- V-255642 High CounterACT must disable all unnecessary and/or nonsecure plugins.
- V-255643 Medium In the event the authentication server is unavailable, one local account must be created for use as the account of last resort.
- V-255644 Medium CounterACT must enforce a minimum 15-character password length.
- V-255645 Medium CounterACT must prohibit password reuse for a minimum of five generations.
- V-255646 Medium CounterACT must enforce password complexity by requiring that at least one numeric character be used.
- V-255647 Medium CounterACT must enforce password complexity by requiring that at least one special character be used.
- V-255648 Medium CounterACT must enforce a 60-day maximum password lifetime restriction.
- V-255649 Medium CounterACT must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-255650 Medium CounterACT must compare internal information systems clocks at least every 24 hours with an authoritative time server.
- V-255651 Medium CounterACT must be configured to synchronize internal information system clocks with the organizations primary and secondary NTP servers.
- V-255652 Medium CounterACT must authenticate any endpoint used for network management before establishing a local, remote, and/or network connection using cryptographically based bidirectional authentication.
- V-255653 High CounterACT must authenticate SNMPv3 endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
- V-255654 High CounterACT appliances performing maintenance functions must restrict use of these functions to authorized personal only.
- V-255655 Medium CounterACT must sent audit logs to a centralized audit server (i.e., syslog server).
- V-255656 Medium CounterACT must employ automated mechanisms to centrally apply authentication settings.
- V-255657 Low CounterACT must limit the number of concurrent sessions to an organization-defined number for each administrator account type.
- V-255658 Low The network device must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
- V-255659 Medium If multifactor authentication is not supported and passwords must be used, CounterACT must enforce password complexity by requiring that at least one upper-case character be used.
- V-255660 Medium If multifactor authentication is not supported and passwords must be used, CounterACT must enforce password complexity by requiring that at least one lower-case character be used.
- V-255661 Medium The network device must terminate shared/group account credentials when members leave the group.
- V-265636 High The version of ForeScout CounterAct must be a supported version.
Removed rules 38
- V-76193 Medium For the local account, CounterACT must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.
- V-76195 Low CounterACT must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.
- V-76197 Medium CounterACT must enforce password complexity by requiring that at least one numeric character be used.
- V-76199 Medium CounterACT must enforce a 60-day maximum password lifetime restriction.
- V-76201 Medium CounterACT must prohibit password reuse for a minimum of five generations.
- V-76203 Medium CounterACT must enforce a minimum 15-character password length.
- V-76205 Medium CounterACT must enforce access restrictions associated with changes to the system components.
- V-76207 Low CounterACT must generate audit log events for a locally developed list of auditable events.
- V-76209 Medium CounterACT must support organizational requirements to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner.
- V-76211 Low CounterACT must support organizational requirements to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner.
- V-76213 Medium CounterACT must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- V-76215 Medium CounterACT must obtain its public key certificates from an appropriate certificate policy through an approved service provider.
- V-76217 Medium CounterACT must enable Threat Protection notifications to alert security personnel to Cyber events detected by a CounterACT IAW CJCSM 6510.01B.
- V-76219 High CounterACT appliances performing maintenance functions must restrict use of these functions to authorized personal only.
- V-76221 Medium CounterACT must employ automated mechanisms to centrally apply authentication settings.
- V-76223 High CounterACT must disable all unnecessary and/or nonsecure plugins.
- V-76225 Medium CounterACT must terminate all network connections associated with an Enterprise Manager Console session upon Exit, or session disconnection, or after 10 minutes of inactivity, except where prevented by documented and validated mission requirements.
- V-76227 Medium CounterACT must terminate all network connections associated with an SSH connection session upon Exit, session disconnection, or after 10 minutes of inactivity, except where prevented by documented and validated mission requirements.
- V-76229 Medium CounterACT must allow only authorized administrators to view or change the device configuration, system files, and other files stored either in the device or on removable media.
- V-76231 Medium If any logs are stored locally which are not sent to the centralized audit server, CounterACT must back up audit records at least every seven days onto a different system or system component than the system or component being audited.
- V-76233 Medium CounterACT must limit privileges to change the software resident within software libraries.
- V-76235 Medium CounterACT must enforce password complexity by requiring that at least one special character be used.
- V-76237 Medium CounterACT must sent audit logs to a centralized audit server (i.e., syslog server).
- V-76239 Medium CounterACT must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC).
- V-76241 Medium CounterACT must be configured to synchronize internal information system clocks with the organizations primary and secondary NTP servers.
- V-76243 Medium CounterACT must restrict the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrators role or to other roles or individuals.
- V-76245 Medium CounterACT must authenticate any endpoint used for network management before establishing a local, remote, and/or network connection using cryptographically based bidirectional authentication.
- V-76247 High CounterACT must authenticate SNMPv3 endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
- V-76249 Medium In the event the authentication server is unavailable, one local account must be created for use as the account of last resort.
- V-76251 Medium CounterACT must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.
- V-76253 Medium The network device must terminate shared/group account credentials when members leave the group.
- V-76255 Low The network device must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.
- V-76257 Low CounterACT must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.
- V-76259 Medium CounterACT must compare internal information systems clocks at least every 24 hours with an authoritative time server.
- V-76261 Medium Administrative accounts for device management must be configured on the authentication server and not the network device itself (except for the account of last resort).
- V-76263 Medium If multifactor authentication is not supported and passwords must be used, CounterACT must enforce password complexity by requiring that at least one upper-case character be used.
- V-76265 Medium If multifactor authentication is not supported and passwords must be used, CounterACT must enforce password complexity by requiring that at least one lower-case character be used.
- V-76267 Low CounterACT must limit the number of concurrent sessions to an organization-defined number for each administrator account type.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- CACT-NM-000001
- Vuln IDs
-
- V-255624
- V-76225
- Rule IDs
-
- SV-255624r961068_rule
- SV-90913
Checks: C-59297r874029_chk
CounterACT is inherently designed to terminate upon Exit or session disconnection, thus this part of the requirement does not have to be verified. To verify the device is configured to terminate management sessions after "10" minutes of inactivity, verify the timeout value is configured. 1. On the Enterprise Manager Console. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "User Inactivity Timeout" check box is selected and the associated setting is set to "10" minutes. If applicable, verify exceptions to this requirement are documented and signed. If Counteract does not terminate the connection associated with an Enterprise Manager Console at the end of the session or after "10" minutes of inactivity, this is a finding.
Fix: F-59240r874030_fix
CounterACT is inherently designed to terminate upon Exit or session disconnection, thus this part of the requirement does not have a fix. To configure CounterACT to terminate the connection after "10" minutes of inactivity perform the following steps. 1. On the Enterprise Manager Console. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "User In-activity Timeout" check box is selected and the associated setting is set to "10 minutes. If exceptions to this requirement are necessary based on mission requirements, document the mission requirement and validate with a signature by a designated authority.
- RMF Control
- SC-10
- Severity
- M
- CCI
- CCI-001133
- Version
- CACT-NM-000002
- Vuln IDs
-
- V-255625
- V-76227
- Rule IDs
-
- SV-255625r961068_rule
- SV-90915
Checks: C-59298r874032_chk
CounterACT is inherently designed to terminate upon Exit or session disconnection, thus this part of the requirement does not have to be verified. To verify the device is configured to terminate management sessions after "10" minutes of inactivity, verify the timeout value is configured. 1. On the Enterprise Manager Console. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "User Inactivity Timeout" check box is selected and the associated setting is set to "10" minutes. If applicable, verify exceptions to this requirement are documented and signed. If Counteract does not terminate the connection associated with an Enterprise Manager Console at the end of the session or after "10" minutes of inactivity, this is a finding.
Fix: F-59241r874033_fix
CounterACT is inherently designed to terminate upon Exit or session disconnection, thus this part of the requirement does not have a fix. To configure CounterACT to terminate the connection after "10" minutes of inactivity perform the following steps. 1. On the Enterprise Manager Console. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "User In-activity Timeout" check box is selected and the associated setting is set to "10" minutes. If exceptions to this requirement are necessary based on mission requirements, document the mission requirement and validate with a signature by a designated authority.
- RMF Control
- SC-28
- Severity
- M
- CCI
- CCI-001199
- Version
- CACT-NM-000003
- Vuln IDs
-
- V-255626
- V-76229
- Rule IDs
-
- SV-255626r961128_rule
- SV-90917
Checks: C-59299r874035_chk
List the contents of CounterACT’s local storage, including any drives supporting removable media (such as flash drives), and check the file permissions of all files on those drives. 1. Log on to the SSH command line interface of a CounterACT Enterprise Manager (EM) or CounterACT appliance using standard admin privilege. 2. At the command prompt, type: cd / (To narrow the search to a specific LINUX directory, replace the / with the full pathname of the directory to be searched.) 3. Use the following command to review file permissions: ls- la If any files allow read or write access by accounts not specifically authorized access or access using non-privileged accounts, this is a finding.
Fix: F-59242r874036_fix
Set the file permissions on files on CounterACT or on removable media used by the device so that only authorized administrators can read or change their contents. This is completed by limiting access to SUDO accounts and command line admin accounts. 1. Review accounts with update privileges to CounterACT appliance configuration by selecting Tools >> Options >> Console User Profiles. 2. Select a user to edit. 3. Select the "Permissions" tab. 4. Ensure the "CounterACT Appliance Configuration" and "CounterACT Appliance Control" radio buttons are set to "View only".
- RMF Control
- AU-12
- Severity
- M
- CCI
- CCI-001914
- Version
- CACT-NM-000005
- Vuln IDs
-
- V-255627
- V-76243
- Rule IDs
-
- SV-255627r961863_rule
- SV-90931
Checks: C-59300r874038_chk
Determine if CounterACT restricts the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrator's role or to other roles or individuals. This requirement may be verified by configuration review or demonstration. 1. Open the CounterACT Administrator Console and log on with admin or operator credentials. 2. Select Tools >> Options >> Console User Profiles. 3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit". 4. Review the "Permissions" tab and verify the following "update" radio check boxes are enabled: Action Thresholds, CounterACT Appliance Configuration, and Enterprise Manager Control. If CounterACT does not provide the capability for organization-identified individuals or roles to change the auditing to be performed based on all selectable event criteria within near real time, this is a finding.
Fix: F-59243r874039_fix
Configure CounterACT to restrict the ability to change the auditing to be performed within the system log based on selectable event criteria to the audit administrator's role or to other roles or individuals. Apply the following configuration changes: 1. Open the CounterACT Administrator Console and log on with admin or operator credentials. 2. Select Tools >> Options >> Console User Profiles. 3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit". 4. Review the "Permissions" tab and ensure the following "update" radio check boxes are enabled: Action Thresholds, CounterACT Appliance Configuration, and Enterprise Manager Control.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001890
- Version
- CACT-NM-000007
- Vuln IDs
-
- V-255628
- V-76239
- Rule IDs
-
- SV-255628r961443_rule
- SV-90927
Checks: C-59301r874041_chk
Determine if CounterACT records time stamps for audit records that can be mapped to UTC. This requirement may be verified by demonstration or configuration review. Verify by connecting to the appliance via SSH using standard user/operator privilege. 1. After logon, type the following command at the prompt using the IP address of the configured NTP server: fstool ntp test <ip address> 2. Verify the date references accurate time and the time zone points to UTC next to the year. If CounterACT does not record time stamps for audit records that can be mapped to UTC, this is a finding.
Fix: F-59244r874042_fix
Configure CounterACT to record time stamps for audit records that can be mapped to UTC. Note: Updating time preferences will force CounterACT into maintenance mode. Use a scheduled outage for planned maintenance and stop CounterACT service prior to adjusting time settings. 1. After logon, type the following command at the prompt using the IP address of the required NTP server: fstool ntp <ip address> 2. Ensure the date references accurate time and the time zone points to UTC next to the year.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000009
- Vuln IDs
-
- V-255629
- V-76217
- Rule IDs
-
- SV-255629r961863_rule
- SV-90905
Checks: C-59302r874044_chk
Verify Threat Protection notifications are enabled and configured. 1. Select Tools >> Options >> Threat Protection. 2. At the bottom of the Threat Protection pane, select "Customer" and then select the "Notify" tab. 3. Verify the Maximum emails per day is set to "15" and infected host notification is set to 1 hour. If CounterACT does not enable Threat Protection notifications to alert security personnel to Cyber events detected by a CounterACT IAW CJCSM 6510.01B, this is a finding.
Fix: F-59245r874045_fix
Enable and configure Threat Protection notifications. 1. Select Tools >> Options >> Threat Protection. 2. At the bottom of the Threat Protection pane, select "Customer" and then select the "Notify" tab. 3. Modify the Maximum emails per day to "15" and infected host notification to 1 hour.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- CACT-NM-000010
- Vuln IDs
-
- V-255630
- V-76207
- Rule IDs
-
- SV-255630r961863_rule
- SV-90895
Checks: C-59303r874047_chk
Determine if CounterACT generates audit log events for a locally developed list of auditable events. 1. Open the CounterACT Console. 2. Select Tools >> Options >> Plugin. 3. Select the Syslog Plugin. 4. Select CounterACT or the Enterprise Manager appliance you would like to verify. 5. Verify additional settings for audit are available by ensuring that either one of these options is selected: "Include only messages generated by the 'send message to syslog action'" or "include NAC policy logs". If CounterACT is not configured to generate audit log events for a locally developed list of auditable events, this is a finding.
Fix: F-59246r874048_fix
Configure CounterACT to generate audit log events for a locally developed list of auditable events. 1. Open the CounterACT Console. 2. Select Tools >> Options >> Plugin. 3. Select the Syslog Plugin. 4. Select CounterACT or the Enterprise Manager appliance you would like to verify. 5. Ensure additional settings for audit are available by ensuring that either one of these options is selected: "Include only messages generated by the 'send message to syslog action'" or "include NAC policy logs".
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-000345
- Version
- CACT-NM-000011
- Vuln IDs
-
- V-255631
- V-76205
- Rule IDs
-
- SV-255631r961863_rule
- SV-90893
Checks: C-59304r874050_chk
Check CounterACT to determine if only authorized administrators have permissions for changes, deletions, and updates on the network device. Inspect the maintenance log to verify changes are being made only by the system administrators. 1. Log on to the CounterACT Administrator UI with admin or operator credentials. 2. From the menu, select Tools >> Options >> User Console and Options. 3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit". 4. Verify the non-administrator account selected does not have "update" on the "Permissions" tab for "CounterACT Appliance Configuration". If unauthorized users are allowed to change the hardware or software, this is a finding.
Fix: F-59247r874051_fix
Configure CounterACT to enforce access restrictions associated with changes to the system components. 1. Log on to the CounterACT Administrator UI with admin or operator credentials. 2. From the menu, select Tools >> Options >> User Console and Options. 3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit". 4. Verify the non-administrator account selected does not have "update" on the "Permissions" tab for "CounterACT Appliance Configuration".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000012
- Vuln IDs
-
- V-255632
- V-76261
- Rule IDs
-
- SV-255632r961863_rule
- SV-90949
Checks: C-59305r874053_chk
Review the CounterACT configuration to determine if administrative accounts for device management exist on the device other than the account of last resort and root account. 1. Log on to the CounterACT Administrator UI with admin or operator credentials. 2. From the menu, select Tools >> Options >> User Console and Options. 3. Select (highlight) the user profile to be reviewed (group or user) and then select "Edit". 4. Verify each user profile is for an approved administrator. 5. Verify each external LDAP group account profile by verifying on the trusted external directory group membership. If any administrative accounts other than the account of last resort and root account exist on the device, this is a finding.
Fix: F-59248r874054_fix
Remove accounts that are not authorized. Do not remove the account of last resort. 1. Log on to the CounterACT Administrator UI with admin or operator credentials. 2. From the menu, select Tools >> Options >> User Console and Options. 3. Select (highlight) the user profile to be reviewed (group or user) and then select "Remove". 4. Remove external group membership, individual users on the Directory service.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000013
- Vuln IDs
-
- V-255633
- V-76209
- Rule IDs
-
- SV-255633r961863_rule
- SV-90897
Checks: C-59306r874056_chk
Check CounterACT to determine if the network device is configured to conduct backups of system-level information contained in the information system when changes occur or weekly, whichever is sooner. 1. Open CounterACT Console and select Tools >> Options. 2. Select the "+" next to "Advanced" menu (toward the bottom). 3. Select the “Backup” submenu. 4. On the “System Backup” tab, verify the "Enable System Backup" radio button is selected. 5. Verify the Backup schedule is selected to at least "weekly". If CounterACT does not support the organizational requirements to conduct backups of system-level data according to the defined frequency, this is a finding.
Fix: F-59249r874057_fix
Configure CounterACT to generate audit log events for a locally developed list of auditable events. 1. Open the CounterACT Console. 2. Select Tools >> Options >> Plugin. 3. Select the Syslog Plugin. 4. Select CounterACT or the Enterprise Manager appliance you would like to verify. 5. Ensure additional settings for audit are available by ensuring that either one of these options is selected: "Include only messages generated by the 'send message to syslog action'" or "include NAC policy logs".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- CACT-NM-000014
- Vuln IDs
-
- V-255634
- V-76211
- Rule IDs
-
- SV-255634r961863_rule
- SV-90899
Checks: C-59307r874059_chk
Review the CounterACT backup configuration to determine if the network device backs up the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner. 1. Open the CounterACT Console and select Tools >> Options. 2. Select the "+" next to "Advanced" menu (toward the bottom). 3. Select the “Backup” submenu. 4. On the “System Backup” tab, verify the "Enable System Backup" radio button is selected. 5. Verify the Backup schedule is selected to at least "weekly". If the network device does not back up the information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner, this is a finding.
Fix: F-59250r874060_fix
Configure CounterACT to conduct backups of information system documentation, including security-related documentation, when changes occur or weekly, whichever is sooner. 1. Open the CounterACT Console and select Tools >> Options. 2. Select the "+" next to "Advanced" menu (toward the bottom). 3. Select the “Backup” submenu. 4. On the “System Backup” tab, ensure the "Enable System Backup" radio button is selected. 5. Ensure the Backup schedule is selected to at least "weekly".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000015
- Vuln IDs
-
- V-255635
- V-76213
- Rule IDs
-
- SV-255635r961863_rule
- SV-90901
Checks: C-59308r874062_chk
Determine if CounterACT obtains public key certificates from an appropriate certificate policy through an approved service provider. To review the Web server certificate presented for captive portal/authentication: 1. Open a command line SSH to CounterACT appliance or Enterprise Manager. 2. Run the following command: >fstool cert test 3. Verify all Web server certificate(s) are printed and reviewable. 4. Verify the signing authority is from an approved certificate authority. If the network device does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-59251r874063_fix
Configure CounterACT to obtain its public key certificates from an appropriate certificate policy through an approved service provider. Reference CounterACT Admin Manual and Appendix 1: Command line tools and subsection "Generating CSRs and importing signed certificates" for more detail on requesting a signed certificate.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000016
- Vuln IDs
-
- V-255636
- V-76215
- Rule IDs
-
- SV-255636r961863_rule
- SV-90903
Checks: C-59309r874065_chk
Determine if CounterACT obtains public key certificates from an appropriate certificate policy through an approved service provider. 1. Open a command line SSH to CounterACT appliance or Enterprise Manager. 2. Run the following command: >fstool dot1x cert print <pathname/filename> for the local server certificate (/usr/local/forescout/etc/dot1x/certs.production/server.pem) 3. Verify the signing authority is from an approved certificate authority. If the network device does not obtain its public key certificates from an appropriate certificate policy through an approved service provider, this is a finding.
Fix: F-59252r874066_fix
Configure CounterACT to obtain its public key certificates from an appropriate certificate policy through an approved service provider. Reference CounterACT 802.1x Plugin guide/help manual under Certificate Request process for additional details on the signing process.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-000044
- Version
- CACT-NM-000020
- Vuln IDs
-
- V-255637
- V-76193
- Rule IDs
-
- SV-255637r960840_rule
- SV-90881
Checks: C-59310r874068_chk
Determine if CounterACT is configured either to enforce the limit of three consecutive invalid logon attempts by a user during a "15" minute time period or to use an authentication server that would perform this function. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "Lock account after" radio button is selected. 4. Verify that "3" password failures for "15" minutes is configured. If the limit of three consecutive invalid logon attempts by a user during a "15" minute time period is not enforced, this is a finding.
Fix: F-59253r874069_fix
Configure CounterACT or its associated authentication server to enforce the limit of three consecutive invalid logon attempts by a user during a "15" minute time period. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "Lock account after" radio button is selected. 4. Ensure that "3" password failures for "15" minutes is configured.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000048
- Version
- CACT-NM-000021
- Vuln IDs
-
- V-255638
- V-76195
- Rule IDs
-
- SV-255638r960843_rule
- SV-90883
Checks: C-59311r874071_chk
1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Enable "Display this Notice and Consent Message after login" and complete the provided text input area to have the Standard Mandatory DoD and Consent Banner appear before granting access to the device. This banner must include the following text: By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". If this is not present, this is a finding.
Fix: F-59254r874072_fix
1. Log on to the CounterACT Administrator UI. 2. Select Tools >> Options >> User Console and Options >> Password and Login. 3. Enable "Display this Notice and Consent Message after login" and complete the provided text input area to have the Standard Mandatory DoD and Consent Banner before granting access to the device. This banner must include the following text: By using this IS (which includes any device attached to this IS), you consent to the following conditions: -The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations. -At any time, the USG may inspect and seize data stored on this IS. -Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose. -This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy. -Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details". 4. Select "Apply" to save the settings.
- RMF Control
- AC-8
- Severity
- L
- CCI
- CCI-000050
- Version
- CACT-NM-000022
- Vuln IDs
-
- V-255639
- V-76257
- Rule IDs
-
- SV-255639r960846_rule
- SV-90945
Checks: C-59312r874074_chk
Verify CounterACT retains the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and takes explicit actions to log on for further access. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the options for the logon banner "require confirmation" is selected. If CounterACT does not retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access, this is a finding.
Fix: F-59255r874075_fix
Configure CounterACT to retain the Standard Mandatory DoD-approved Notice and Consent Banner on the screen until users acknowledge the usage conditions and take explicit actions to log on for further access. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the options for logon banner "require confirmation" is selected.
- RMF Control
- AU-9
- Severity
- M
- CCI
- CCI-001348
- Version
- CACT-NM-000023
- Vuln IDs
-
- V-255640
- V-76231
- Rule IDs
-
- SV-255640r961863_rule
- SV-90919
Checks: C-59313r874077_chk
If all audit logs for the Enterprise Manager and appliances are sent to an audit log, this is not a finding. Determine if CounterACT backs up local logs on the Enterprise Manager or appliances at least every seven days onto a different system or system component than the system or component being audited. This requirement may be verified by configuration review. 1. Open the CounterACT Console and select Tools >> Options. 2. Select the "+" next to "Advanced" menu (toward the bottom). 3. Select the “Backup” submenu. 4. On the "System Backup" tab, verify the "Enable System Backup" radio button is selected. 5. Verify the Backup schedule is selected to at least "weekly". 6. On the "Backup Server" tab, verify an external backup server is configured with SFTP or SCP (and appropriate port/protocol requirements). If the network device does not back up audit records at least every seven days onto a different system or system component than the system or component being audited, this is a finding.
Fix: F-59256r874078_fix
Configure CounterACT to back up locally stored audit records on the Enterprise Manager or the appliances at least every seven days onto a different system or system component than the system or component being audited. 1. Open the CounterACT Console and select Tools >> Options. 2. Select the "+" next to "Advanced" menu (toward the bottom). 3. Select the “Backup” submenu. 4. On the "System Backup" tab, ensure the "Enable System Backup" radio button is selected. 5. Ensure the Backup schedule is selected to at least "weekly". 6. On the "Backup Server" tab, verify an external backup server is configured with SFTP or SCP (and appropriate port/protocol requirements).
- RMF Control
- CM-5
- Severity
- M
- CCI
- CCI-001499
- Version
- CACT-NM-000024
- Vuln IDs
-
- V-255641
- V-76233
- Rule IDs
-
- SV-255641r960960_rule
- SV-90921
Checks: C-59314r874080_chk
Ask if there are users defined in CounterACT that are not authorized to change the software libraries. Verify that Administrator privileges have been restricted for these users. This is verified by reviewing the administrator account profiles and auditing the assigned privilege for updated CounterACT software. 1. Log on to the CounterACT Console and select Tools >> Options >> Console User Profiles. 2. Select the non-privileged user profiles and then select "Edit". 3. Verify the users do not have the "Plugin Management" and "Software Upgrade" options selected. If CounterACT is not configured to limit privileges to change the software resident within software libraries for unauthorized users, this is a finding.
Fix: F-59257r874081_fix
Configure CounterACT to prevent access to change the software resident within software libraries for unauthorized personnel. 1. Log on to the CounterACT Console and select Tools >> Options >> Console User Profiles. 2. Select the non-privileged user profiles and then select "Edit". 3. Verify the users do not have the "Plugin Management" and "Software Upgrade" options selected.
- RMF Control
- CM-7
- Severity
- H
- CCI
- CCI-000382
- Version
- CACT-NM-000025
- Vuln IDs
-
- V-255642
- V-76223
- Rule IDs
-
- SV-255642r960966_rule
- SV-90911
Checks: C-59315r874083_chk
Navigate to the plugin tool and remove all unneeded or unsecure services. 1. Connect to the CounterACT Console and select Tools >> Options >> Plugins. 2. Review the list of plugins. If an unnecessary or nonsecure service is "Enabled", select the plugin and then select "Configure". If no configuration is present, this is a finding. If any unnecessary or nonsecure functions are enabled, this is a finding.
Fix: F-59258r874084_fix
Configure the network device to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services. The following is an example of disabling the wireless plugin if no wireless devices are directly managed by CounterACT. Example: 1. Connect to the CounterACT Console and select Tools >> Options >> Plugins. 2. Determine if the wireless plugin status is "Enabled", select the plugin, and select "Stop" (for all appliances). This process can be used to disable or remove plugins not being used.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-001358
- Version
- CACT-NM-000027
- Vuln IDs
-
- V-255643
- V-76249
- Rule IDs
-
- SV-255643r960969_rule
- SV-90937
Checks: C-59316r874086_chk
Verify that only one local account exists and it has full administrator privileges. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options. If more than one local user account exists, this is a finding.
Fix: F-59259r874087_fix
Create a local account with full administrator privileges to be used as the account of last resort. The default admin account may be used to fulfill this requirement. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options. Remove unneeded accounts, if any.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000205
- Version
- CACT-NM-000030
- Vuln IDs
-
- V-255644
- V-76203
- Rule IDs
-
- SV-255644r984092_rule
- SV-90891
Checks: C-59317r874089_chk
Determine if the network device enforces a minimum 15-character password length. This requirement may be verified by demonstration or configuration review. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "minimum length" is configured for "15". If CounterACT does not enforce a minimum 15-character password length, this is a finding.
Fix: F-59260r874090_fix
1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Configure the "minimum length" for "15". 4. Verify additional complexity requirements are also met.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000200
- Version
- CACT-NM-000031
- Vuln IDs
-
- V-255645
- V-76201
- Rule IDs
-
- SV-255645r961863_rule
- SV-90889
Checks: C-59318r874092_chk
Determine if CounterACT prohibits password reuse for a minimum of five generations. This requirement may be verified by demonstration or configuration review. 1. Verify if the user profiles are using external authentication server or local. If using local, proceed to Step 2. If using external, verify the settings using the Authentication Server configuration guide. 2. Log on to the CounterACT Administrator UI. 3. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 4. Verify the "Last" radio button is selected and the option with "5" passwords cannot be reused is configured. If CounterACT does not prohibit password reuse for a minimum of five generations, this is a finding.
Fix: F-59261r874093_fix
Configure CounterACT to prohibit password reuse for a minimum of five generations. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "Last" radio button is selected and the option with "5" passwords cannot be reused is configured.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000194
- Version
- CACT-NM-000032
- Vuln IDs
-
- V-255646
- V-76197
- Rule IDs
-
- SV-255646r984099_rule
- SV-90885
Checks: C-59319r874095_chk
Verify CounterACT enforces password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration, configuration review, or validated test results. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the complexity requirements are met. If CounterACT does not require that at least one numeric character be used in each password, this is a finding.
Fix: F-59262r874096_fix
1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Configure the complexity requirements to require the use of at least one numeric character in each password.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-001619
- Version
- CACT-NM-000033
- Vuln IDs
-
- V-255647
- V-76235
- Rule IDs
-
- SV-255647r984100_rule
- SV-90923
Checks: C-59320r874098_chk
Verify CounterACT enforces password complexity by requiring that at least one special character be used. This requirement may be verified by demonstration, configuration review, or validated test results. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the complexity requirement for use of at least one special character is met. If CounterACT does not require that at least one special character be used in each password, this is a finding.
Fix: F-59263r874099_fix
1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Configure the complexity requirement for use of at least one special character.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000199
- Version
- CACT-NM-000034
- Vuln IDs
-
- V-255648
- V-76199
- Rule IDs
-
- SV-255648r961863_rule
- SV-90887
Checks: C-59321r874101_chk
Determine if CounterACT enforces a 60-day maximum password lifetime. This requirement may be verified by demonstration or configuration review. This requirement does not include root account or the account of last resort. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "password expires after" radio button is selected and configured to 60 days. If CounterACT does not enforce a 60-day maximum password lifetime, this is a finding.
Fix: F-59264r874102_fix
Configure CounterACT to enforce a 60-day maximum password lifetime. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "password expires after" radio button is selected and configured to 60 days. This requirement does not include root account or the account of last resort.
- RMF Control
- AC-7
- Severity
- M
- CCI
- CCI-002238
- Version
- CACT-NM-000035
- Vuln IDs
-
- V-255649
- V-76251
- Rule IDs
-
- SV-255649r961863_rule
- SV-90939
Checks: C-59322r874104_chk
Determine CounterACT automatically locks the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. This requirement may be verified by demonstration or configuration review. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "Lock account After" radio button is selected. 4. Verify "3" is selected for the password failures setting. 5. Verify that "15" and "minutes" are selected. If an account is not automatically locked out until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded, this is a finding.
Fix: F-59265r874105_fix
Configure CounterACT to automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "Lock account After" radio button is selected. 4. Ensure that "3" is selected for the password failures setting. 5. Ensure that "15" and "minutes" are selected.
- RMF Control
- AU-8
- Severity
- M
- CCI
- CCI-001891
- Version
- CACT-NM-000036
- Vuln IDs
-
- V-255650
- V-76259
- Rule IDs
-
- SV-255650r961863_rule
- SV-90947
Checks: C-59323r874107_chk
Check the network device configuration to determine if the device compares internal information system clocks at least every 24 hours with an authoritative time server. 1. Open an SSH session and authenticate to the CounterACT command line. 2. Verify the configured NTP servers with the command "fstool ntp". 3. Run the "date" command to look at the current system time compared to the known good, Network Time Protocol (NTP) server time. If the device does not compare internal information system clocks at least every 24 hours, this is a finding.
Fix: F-59266r874108_fix
Configure CounterACT to compare internal information system clocks at least every 24 hours with an authoritative time server. 1. Open an SSH session and authenticate to CounterACT command line. 2. Configure the NTP servers with the command "fstool ntp setup <ip address>".
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000038
- Vuln IDs
-
- V-255651
- V-76241
- Rule IDs
-
- SV-255651r987682_rule
- SV-90929
Checks: C-59324r874110_chk
Determine if CounterACT is configured to synchronize internal clocks with the organization's primary and secondary NTP servers. 1. Open an SSH session and authenticate to the CounterACT command line. 2. Verify a primary and secondary NTP server has been configured with the command "fstool ntp". If CounterACT is not configured to synchronize internal information system clocks with the organization's primary and secondary NTP servers, this is a finding.
Fix: F-59267r874111_fix
Configure CounterACT to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources. 1. Open an SSH session and authenticate to the CounterACT command line. 2. Configure the primary and secondary NTP servers with the command "fstool ntp setup <ip address>".
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- CACT-NM-000039
- Vuln IDs
-
- V-255652
- V-76245
- Rule IDs
-
- SV-255652r961506_rule
- SV-90933
Checks: C-59325r874113_chk
Review the CounterACT configuration to determine if the network device authenticates network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. 1. Select Tools >> Options >> Switch. 2. Select a network device and review the "CLI" tab. 3. If the radio button for "Use CLI" is selected, verify that the "SSH" drop-down option is also selected. Repeat this process for each switch. If anything other than SSH is selected, this is a finding.
Fix: F-59268r874114_fix
Configure the network device to authenticate network management endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. 1. Select Tools >> Options >> Switch. 2. Select a network device and review the "CLI" tab. 3. If the radio button for "Use CLI" is selected, select the "SSH" drop-down option and use proper credentials.
- RMF Control
- IA-3
- Severity
- H
- CCI
- CCI-001967
- Version
- CACT-NM-000040
- Vuln IDs
-
- V-255653
- V-76247
- Rule IDs
-
- SV-255653r961506_rule
- SV-90935
Checks: C-59326r874116_chk
Review the CounterACT configuration to determine if the network device authenticates SNMP endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. 1. Select Tools >> Options >> Switch. 2. Select a network device and review the "SNMP" tab. 3. Verify that the "SNMPv3" option is selected and the "HMAC-SHA" authentication protocol is selected. 4. Verify that the "use privacy" radio button is selected and "AES-128" is also selected from the drop-down box. If CounterACT does not authenticate the endpoint devices before establishing a connection using bidirectional authentication that is cryptographically based, this is a finding.
Fix: F-59269r874117_fix
Configure CounterACT to authenticate SNMP endpoint devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based. 1. Select Tools >> Options >> Switch. 2. Select a network device and review the "SNMP" tab. 3. Ensure that the "SNMPv3" option is selected and the "HMAC-SHA" authentication protocol is selected. 4. Ensure that the "use privacy" radio button is selected and "AES-128" is also selected from the drop-down box.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- CACT-NM-000041
- Vuln IDs
-
- V-255654
- V-76219
- Rule IDs
-
- SV-255654r961545_rule
- SV-90907
Checks: C-59327r874119_chk
Determine if the network device restricts the use of maintenance functions to authorized personnel only. View the list of users defined on the device. Select Tools >> Options >> Console User Profiles. If other personnel can use maintenance functions on the network device, this is a finding.
Fix: F-59270r874120_fix
Configure the access privileges to CounterACT to restrict use of maintenance functions to authorized personnel only. 1. Select Tools >> Options >> Console User Profiles. 2. Adjust or remove the unauthorized group or user profile. Note: The RAFACS must also be inspected for unauthorized users.
- RMF Control
- AU-4
- Severity
- M
- CCI
- CCI-001851
- Version
- CACT-NM-000042
- Vuln IDs
-
- V-255655
- V-76237
- Rule IDs
-
- SV-255655r961860_rule
- SV-90925
Checks: C-59328r874122_chk
Check the CounterACT configuration to determine if the device off-loads audit records onto a different system or media than the system being audited. 1. From the console, select Tools >> Options >> Plugins >> Syslog. 2. Verify the Syslog Plugin is running (on all CounterACT appliances). 3. Open the Plugin, selecting the appliance configuration for review. 4. Verify the "Send To" tab has an available log server properly configured. 5. Verify the Events Filtering includes ALL events, except the "Include only messages generated by the 'Send Message to Syslog' Action". This item should remain unchecked. If the device does not off-load audit records onto a different system or media, this is a finding.
Fix: F-59271r874123_fix
Configure the network device to off-load audit records onto a different system or media than the system being audited. 1. From the console, select Tools >> Options >> Plugins >> Syslog. 2. Verify the Syslog Plugin is running (on all CounterACT appliances). If it is not, start the plugin in each appliance. 3. Open the Plugin, selecting the appliance configuration for review. 4. From the "Send To" tab, configure a Syslog server for Log export. (Refer to the CounterACT admin guide for additional references on proper configuration.) 5. Ensure the Events Filtering includes ALL events, except the "Include only messages generated by the 'Send Message to Syslog' Action". This item should remain unchecked.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- CACT-NM-000044
- Vuln IDs
-
- V-255656
- V-76221
- Rule IDs
-
- SV-255656r961863_rule
- SV-90909
Checks: C-59329r874125_chk
Review the network device configuration to determine if it employs automated mechanisms to centrally apply authentication settings. 1. Connect to the User Directory Console user interface. 2. Select Tools >> Options >> User Directory. 3. Verify the Active Directory configuration exists and tests pass by selecting the chosen directory and selecting "Test". If authentication settings are not applied centrally using automated mechanisms, this is a finding.
Fix: F-59272r874126_fix
Configure CounterACT to employ automated mechanisms to centrally apply authentication settings. 1. Connect to the User Directory Console user interface. 2. Select Tools >> Options >> User Directory. 3. Add the configuration to the Active Directory configuration, select the chosen directory, and select "Test".
- RMF Control
- AC-10
- Severity
- L
- CCI
- CCI-000054
- Version
- CACT-NM-000051
- Vuln IDs
-
- V-255657
- V-76267
- Rule IDs
-
- SV-255657r960735_rule
- SV-90955
Checks: C-59330r874128_chk
Determine if CounterACT requires a limit of one session per user. This requirement may be verified by demonstration or configuration review. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "allow only one login session per user" radio button is selected and configured to either Log out existing session or Deny new logon attempts. If CounterACT does not enforce one session per user, this is a finding.
Fix: F-59273r874129_fix
Configure CounterACT to require a limit of one session per user. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "allow only one login session per user" radio button is selected and configured to either Log out existing session or Deny new logon attempts.
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- CACT-NM-000086
- Vuln IDs
-
- V-255658
- V-76255
- Rule IDs
-
- SV-255658r961863_rule
- SV-90943
Checks: C-59331r874131_chk
Review the CounterACT configuration to determine if an authentication server is required to access the device. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Directory. 3. Verify the selected authentication server is enabled for GUI authentication. If an authentication server is not configured for use by CounterACT, this is a finding.
Fix: F-59274r874132_fix
Configure CounterACT to use an authentication server to access the device. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Directory. 3. Enable the selected authentication server.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000192
- Version
- CACT-NM-000147
- Vuln IDs
-
- V-255659
- V-76263
- Rule IDs
-
- SV-255659r984095_rule
- SV-90951
Checks: C-59332r874134_chk
Determine if CounterACT requires at least one upper-case character to be used in passwords. This requirement may be verified by demonstration or configuration review. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "password must contain at least # upper case alphabetic characters" radio button is selected and configured to at least 1. If CounterACT does not enforce at least one upper-case character, this is a finding.
Fix: F-59275r874135_fix
Configure CounterACT to require a minimum of one upper-case character. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "password must contain at least # upper case alphabetic characters" radio button is selected and configured to at least 1.
- RMF Control
- IA-5
- Severity
- M
- CCI
- CCI-000193
- Version
- CACT-NM-000148
- Vuln IDs
-
- V-255660
- V-76265
- Rule IDs
-
- SV-255660r984098_rule
- SV-90953
Checks: C-59333r874137_chk
Determine if CounterACT requires at least one lower-case character to be used in passwords. This requirement may be verified by demonstration or configuration review. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Verify the "password must contain at least # lower case alphabetic characters" radio button is selected and configured to at least 1. If CounterACT does not enforce at least one lower-case character, this is a finding.
Fix: F-59276r874138_fix
Configure CounterACT to require a minimum of one lower-case character. 1. Log on to the CounterACT Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Ensure the "password must contain at least # lower case alphabetic characters" radio button is selected and configured to at least 1.
- RMF Control
- AC-2
- Severity
- M
- CCI
- CCI-002142
- Version
- CACT-NM-000149
- Vuln IDs
-
- V-255661
- V-76253
- Rule IDs
-
- SV-255661r984107_rule
- SV-90941
Checks: C-59334r874140_chk
Review the documentation to verify that a procedure exists to change the account of last resort and root account password when users with knowledge of the password leave the group. If a procedure does not exist to change the account of last resort and root account password when users with knowledge of the password leave the group, this is a finding.
Fix: F-59277r874141_fix
Establish and document a procedure that requires the changing of the account of last resort and root account password when users with knowledge of the password leave the group. To change the password: 1. Log on to CounterACT's Administrator UI. 2. From the menu, select Tools >> Options >> User Console and Options >> Password and Login. 3. Enter a new password. Note: Use of a cryptographically generated password is recommended. Password must be stored in a locked safe and used only when necessary since individual accounts are required to be used to ensure non-repudiation.
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- CACT-NM-999999
- Vuln IDs
-
- V-265636
- Rule IDs
-
- SV-265636r997800_rule
Checks: C-69553r997798_chk
ForeScout CounterAct versions supported by this STIG (Version 8 and earlier) are no longer supported by the vendor. If the system is running any CounterAct version, this is a finding.
Fix: F-53958r798705_fix
Upgrade to a supported version.