UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Forescout must be configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used.


Overview

Finding ID Version Rule ID IA Controls Severity
V-233313 FORE-NC-000050 SV-233313r615864_rule Medium
Description
Connections that bypass established security controls should be allowed only in cases of administrative need. These procedures and use cases must be approved by the Information System Security Manager (ISSM). This setting may be sent from the assessment server, a central server, or from the remediation server. Verify the user is notified and accepts (e.g., using an accept button) that remediation is needed and is about to begin.
STIG Date
Forescout Network Access Control Security Technical Implementation Guide 2020-12-11

Details

Check Text ( C-36508r615863_chk )
Check Forescout policy to ensure that exempt devices that are in need of remediation prompt the user to accept the remediation process, prior to conducting.

1. Log on to the Forescout UI.
2. Select the "Policy" tab.
3. Review the compliance policy identified by the site representation as the remediation policy, then click "Edit".
4. In the Sub-Rules section, select a policy and click "Edit".
5. From the Actions section, verify that the policy is configured to notify the user, prior to remediation, that user interaction is required.

If Forescout is not configured to notify the user before proceeding with remediation of the user's endpoint device when automated remediation is used, this is a finding.
Fix Text (F-36473r605643_fix)
Log on to the Forescout UI.

1. Select the "Policy" tab.
2. Select a compliance policy, then click "Edit".
3. In the Sub-Rules section, select a policy and click "Edit".
4. From the Actions section, click Add >> Notify >> and select a notification method.