STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to VMware Workspace ONE UEM Security Technical Implementation Guide

V-251262

CAT I (High)

The Workspace ONE UEM local accounts must prohibit password reuse for a minimum of five generations.

Rule ID

SV-251262r971326_rule

STIG

VMware Workspace ONE UEM Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000200

Discussion

Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e)

Check Content

Verify WS1 UEM is configured to prohibit password reuse for a minimum of five generations for local account passwords for the emergency local account.

1. Log in to the WS1UEM console.
2. Go to Settings >> Admin >> Console Security >> Passwords.
3. Verify "Enforced password history" to "5 passwords remembered".

If WS1 UEM is not configured to prohibit password reuse for a minimum of five generations for local account passwords, this is a finding.

Fix Text

Configure WS1 UEM to prohibit password reuse for a minimum of five generations for local account passwords for the emergency local account.

1. Log in to the WS1UEM console.
2. Go to Settings >> Admin >> Console Security >> Passwords.
3. Configure "Enforced password history" to "5 passwords remembered".