STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to ForeScout CounterACT NDM Security Technical Implementation Guide

V-255656

CAT II (Medium)

CounterACT must employ automated mechanisms to centrally apply authentication settings.

Rule ID

SV-255656r961863_rule

STIG

ForeScout CounterACT NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000366CCI-000371

Discussion

The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which leads to delays in remediating production problems and addressing compromises in a timely fashion.

Check Content

Review the network device configuration to determine if it employs automated mechanisms to centrally apply authentication settings.

1. Connect to the User Directory Console user interface.
2. Select Tools >> Options >> User Directory.
3. Verify the Active Directory configuration exists and tests pass by selecting the chosen directory and selecting "Test".

If authentication settings are not applied centrally using automated mechanisms, this is a finding.

Fix Text

Configure CounterACT to employ automated mechanisms to centrally apply authentication settings.

1. Connect to the User Directory Console user interface.
2. Select Tools >> Options >> User Directory.
3. Add the configuration to the Active Directory configuration, select the chosen directory, and select "Test".