Skip to content

Forescout must be configured so client machines do not communicate with other network devices in the DMZ or subnet except as needed to perform a client assessment or to identify itself. This is required for compliance with C2C Step 2.

An XCCDF Rule

Description

<VulnDiscussion>Devices not compliant with DoD secure configuration policies are vulnerable to attack. Allowing these systems to connect presents a danger to the enclave. Verify that Forescout is not allowed to communicate with other hosts in the DMZ that do not perform security policy assessment or remediation services.</VulnDiscussion><FalsePositives></FalsePositives><FalseNegatives></FalseNegatives><Documentable>false</Documentable><Mitigations></Mitigations><SeverityOverrideGuidance></SeverityOverrideGuidance><PotentialImpacts></PotentialImpacts><ThirdPartyTools></ThirdPartyTools><MitigationControl></MitigationControl><Responsibility></Responsibility><IAControls></IAControls>

ID
SV-233319r811387_rule
Severity
Medium
References
Updated



Remediation - Manual Procedure

Configure Forescout  to prevent communication with other hosts in the DMZ that do not perform security policy assessment or remediation services.

1. Log on to the Forescout UI. 
2. Select Tools >> Options >> Appliance >> IP Assignment.
3. Select Segment >> IP Addresses. Find the IP address for the DMZ subnet and delete it.