Skip to content

Forescout Network Access Control Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • Forescout must place client machines on a blacklist or terminate network communications on devices when critical security issues are found that put the network at risk. This is required for compliance with C2C Step 4.

    <VulnDiscussion>Devices that are found to have critical security issues place the network at risk if they are allowed to continue communicati...
    Rule High Severity
  • SRG-NET-000015-NAC-000130

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform a client assessment or to identify itself. This is required for compliance with C2C Step 2.

    &lt;VulnDiscussion&gt;Devices not compliant with DOD secure configuration policies are vulnerable to attack. While endpoints are undergoing NAC aut...
    Rule Medium Severity
  • SRG-NET-000321-NAC-001210

    <GroupDescription></GroupDescription>
    Group
  • Forescout must enforce the revocation of endpoint access authorizations when devices are removed from an authorization group. This is required for compliance with C2C Step 4.

    &lt;VulnDiscussion&gt;Ensuring the conditions that are configured in policy have proper time limits set to reflect changes will allow for proper ac...
    Rule Medium Severity
  • SRG-NET-000322-NAC-001220

    <GroupDescription></GroupDescription>
    Group
  • Communications between Forescout endpoint agent and the switch must transmit access authorization information via a protected path using a cryptographic mechanism. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Forescout solution assesses the compliance posture of each client and returns an access decision based on configured security...
    Rule Medium Severity
  • SRG-NET-000492-NAC-002110

    <GroupDescription></GroupDescription>
    Group
  • Forescout must generate a log record when the client machine fails policy assessment because required security software is missing or has been deleted. This is required for compliance with C2C Step 1.

    &lt;VulnDiscussion&gt;Generating log records with regard to modules and policies is an important part of maintaining proper cyber hygiene. Keeping ...
    Rule Medium Severity
  • SRG-NET-000336-NAC-001390

    <GroupDescription></GroupDescription>
    Group

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules