STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Samsung SDS EMM Security Technical Implementation Guide

V-225656

CAT II (Medium)

The Samsung SDS EMM must enforce the limit of three consecutive invalid logon attempts by a user.

Rule ID

SV-225656r588007_rule

STIG

Samsung SDS EMM Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000044

Discussion

By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the account. SFR ID: FMT_SMF.1(2)b. / IA-7-a Satisfies: SRG-APP-000065, PP-MDM-991000

Check Content

Review the Samsung SDS EMM configuration settings and verify the server is configured to enforce the limit of three consecutive invalid logon attempts by admin.

On the MDM console, verify that the MDM console "Maximum Failed Login Attempts" is set to "3".  

If the administrator incorrectly enters the login password three times, the account is locked.

If the MDM console Maximum Failed Login Attempts is not set to "3", this is a finding.

Fix Text

Configure the Samsung SDS EMM to enforce the limit of three consecutive invalid logon attempts by an admin.

On the MDM console, do the following:
1. Log in to the Admin Console using a web browser.
2. Go to Setting >> Server >> Configuration and set "Maximum Failed Login Attempts" to "3".