UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must be configured to use a centralized authentication server to authenticate privileged users for remote and nonlocal access for device management.


Overview

Finding ID Version Rule ID IA Controls Severity
V-76255 CACT-NM-000086 SV-90943r1_rule Low
Description
The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.
STIG Date
ForeScout CounterACT NDM Security Technical Implementation Guide 2017-09-19

Details

Check Text ( C-75941r1_chk )
Review the CounterACT configuration to determine if an authentication server is required to access the device.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Directory.
3. Verify the selected authentication server is enabled for GUI authentication.

If an authentication server is not configured for use by CounterACT, this is a finding.
Fix Text (F-82891r1_fix)
Configure CounterACT to use an authentication server to access the device.

1. Log on to the CounterACT Administrator UI.
2. From the menu, select Tools >> Options >> User Directory.
3. Enable the selected authentication server.