UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Jamf Pro EMM local accounts must prohibit password reuse for a minimum of five generations.


Overview

Finding ID Version Rule ID IA Controls Severity
V-241811 JAMF-10-100780 SV-241811r879887_rule Medium
Description
Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. To meet password policy requirements, passwords need to be changed at specific policy-based intervals. If the information system or application allows the user to consecutively reuse their password when that password has exceeded its defined lifetime, the end result is a password that is not changed as per policy requirements. SFR ID: FMT_SMF.1(2)b. / IA-5 (1) (e) Satisfies: SRG-APP-000165
STIG Date
Jamf Pro v10.x EMM Security Technical Implementation Guide 2023-05-23

Details

Check Text ( C-45087r685185_chk )
To verify the local accounts "Password History" is set to a minimum of "5" generations, do the following:

1. Open the Jamf Pro EMM console.
2. Click "Settings".
3. Click "System Settings".
4. Click "Jamf Pro System User Accounts & Groups".
5. Click "Password Policy".
6. Verify "Password History" to "5" or more.

If "Password History" is not set to "5" or more, this is a finding.
Fix Text (F-45046r685186_fix)
Note: This requirement is NA if Option #1 is selected in requirement JAMF-10-000685.

To configure the "Password History" of the local accounts password to a minimum of "5" generations, do the following:

1. Open the Jamf Pro EMM console.
2. Click "Settings".
3. Click "System Settings".
4. Click "Jamf Pro System User Accounts & Groups".
5. Click "Password Policy".
6. Set the "Password History" to "5" or more.