UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Forescout must limit the number of concurrent sessions to one for each administrator account.


Overview

Finding ID Version Rule ID IA Controls Severity
V-230930 FORE-NM-000010 SV-230930r615886_rule Low
Description
Device management includes the ability to control the number of administrators and management sessions that manage a device. Limiting the number of allowed administrators and sessions per administrator based on account type, role, or access type is helpful in limiting risks related to denial of service (DoS) attacks. This requirement addresses concurrent sessions for administrative accounts and does not address concurrent sessions by a single administrator via multiple administrative accounts. The maximum number of concurrent sessions must be defined based upon mission needs and the operational environment for each system. At a minimum, limits must be set for SSH, HTTPS, account of last resort, and root account sessions.
STIG Date
Forescout Network Device Management Security Technical Implementation Guide 2020-12-11

Details

Check Text ( C-33860r603629_chk )
Determine if Forescout requires a limit of one session per user. This requirement may be verified by demonstration or configuration review.

1. Log on to the Forescout Administrator UI.
2. From the menu, select Tools >> Options >> CounterAct user profiles >> Password and Sessions >> Session.
3. Verify the "allow only one login session per user", "Terminate existing session upon new login", and "Console and web portal sessions cannot exist concurrently".

If Forescout does not enforce one session per user, this is a finding.
Fix Text (F-33833r603630_fix)
Configure Forescout to require a limit of one session per user.

1. Log on to the Forescout Administrator UI.
2. From the menu, select Tools >> Options >> CounterAct user profiles >> Password and Sessions >> Session.
3. Check "allow only one login session per user".
4. Select the "Terminate existing session upon new login" radio button.
5. Select "Console and web portal sessions cannot exist concurrently".