Skip to content

Forescout Network Device Management Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000148-NDM-000346

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured with only one web account and one CLI account of last resort with limited access and used only when the authentication server is unavailable.

    &lt;VulnDiscussion&gt;Authentication for administrative (privileged-level) access to the device is required at all times. An account can be created...
    Rule Medium Severity
  • SRG-APP-000065-NDM-000214

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must lock out the user account from accessing the device for 15 minutes.

    &lt;VulnDiscussion&gt;By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise...
    Rule Medium Severity
  • SRG-APP-000068-NDM-000215

    <GroupDescription></GroupDescription>
    Group
  • Forescout must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.

    &lt;VulnDiscussion&gt;Display of the DoD-approved use notification before granting access to the application ensures privacy and security notificat...
    Rule Low Severity
  • SRG-APP-000069-NDM-000216

    <GroupDescription></GroupDescription>
    Group
  • Forescout must retain the Standard Mandatory DoD Notice and Consent Banner on the screen until the administrator acknowledges the usage conditions and takes explicit actions to log on for further access.

    &lt;VulnDiscussion&gt;The banner must be acknowledged by the administrator prior to the device allowing the administrator access to the network dev...
    Rule Low Severity
  • SRG-APP-000091-NDM-000223

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured to synchronize internal information system clocks using redundant authoritative time sources.

    &lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run ...
    Rule Medium Severity
  • SRG-APP-000374-NDM-000299

    <GroupDescription></GroupDescription>
    Group
  • Forescout must be configured to use Coordinated Universal Time (UTC).

    &lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analys...
    Rule Medium Severity
  • SRG-APP-000378-NDM-000302

    <GroupDescription></GroupDescription>
    Group
  • Forescout must prohibit installation of software without explicit privileged permission by only authorized individuals.

    &lt;VulnDiscussion&gt;Allowing anyone to install software, without explicit privileges, creates the risk that untested or potentially malicious sof...
    Rule Medium Severity
  • SRG-APP-000380-NDM-000304

    <GroupDescription></GroupDescription>
    Group
  • Forescout must enforce access restrictions associated with changes to device configuration.

    &lt;VulnDiscussion&gt;Failure to provide logical access restrictions associated with changes to device configuration may have significant effects o...
    Rule Medium Severity
  • SRG-APP-000381-NDM-000305

    <GroupDescription></GroupDescription>
    Group
  • Forescout must audit the enforcement actions used to restrict access associated with changes to the device.

    &lt;VulnDiscussion&gt;Without auditing the enforcement of access restrictions against changes to the device configuration, it will be difficult to ...
    Rule Low Severity
  • SRG-APP-000131-NDM-000243

    <GroupDescription></GroupDescription>
    Group
  • Forescout must prevent the installation of patches, service packs, plug-ins, or modules without verification the update has been digitally signed using a certificate that is recognized and approved by the organization.

    &lt;VulnDiscussion&gt;Changes to any software components can have significant effects on the overall security of the network device. Verifying soft...
    Rule Low Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules