<?xml version="1.0" encoding="utf-8"?><?xml-stylesheet type='text/xsl' href='STIG_unclass.xsl'?><Benchmark xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:dsig="http://www.w3.org/2000/09/xmldsig#" xsi:schemaLocation="http://checklists.nist.gov/xccdf/1.1 http://nvd.nist.gov/schema/xccdf-1.1.4.xsd http://cpe.mitre.org/dictionary/2.0 http://cpe.mitre.org/files/cpe-dictionary_2.1.xsd" id="Palo_Alto_Networks_NDM_STIG" xml:lang="en" xmlns="http://checklists.nist.gov/xccdf/1.1"><status date="2025-03-12">accepted</status><title>Palo Alto Networks NDM Security Technical Implementation Guide</title><description>This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DOD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.letterkenny.FSO.mbx.stig-customer-support-mailbox@mail.mil.</description><notice id="terms-of-use" xml:lang="en"></notice><front-matter xml:lang="en"></front-matter><rear-matter xml:lang="en"></rear-matter><reference href="https://cyber.mil"><dc:publisher>DISA</dc:publisher><dc:source>STIG.DOD.MIL</dc:source></reference><plain-text id="release-info">Release: 3 Benchmark Date: 02 Apr 2025</plain-text><plain-text id="generator">3.5</plain-text><plain-text id="conventionsVersion">1.10.0</plain-text><version>3</version><Profile id="MAC-1_Classified"><title>I - Mission Critical Classified</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-1_Public"><title>I - Mission Critical Public</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-1_Sensitive"><title>I - Mission Critical Sensitive</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-2_Classified"><title>II - Mission Support Classified</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-2_Public"><title>II - Mission Support Public</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-2_Sensitive"><title>II - Mission Support Sensitive</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-3_Classified"><title>III - Administrative Classified</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-3_Public"><title>III - Administrative Public</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Profile id="MAC-3_Sensitive"><title>III - Administrative Sensitive</title><description>&lt;ProfileDescription&gt;&lt;/ProfileDescription&gt;</description><select idref="V-228639" selected="true" /><select idref="V-228640" selected="true" /><select idref="V-228642" selected="true" /><select idref="V-228643" selected="true" /><select idref="V-228645" selected="true" /><select idref="V-228647" selected="true" /><select idref="V-228648" selected="true" /><select idref="V-228650" selected="true" /><select idref="V-228651" selected="true" /><select idref="V-228652" selected="true" /><select idref="V-228653" selected="true" /><select idref="V-228654" selected="true" /><select idref="V-228655" selected="true" /><select idref="V-228658" selected="true" /><select idref="V-228659" selected="true" /><select idref="V-228660" selected="true" /><select idref="V-228661" selected="true" /><select idref="V-228662" selected="true" /><select idref="V-228663" selected="true" /><select idref="V-228664" selected="true" /><select idref="V-228665" selected="true" /><select idref="V-228666" selected="true" /><select idref="V-228667" selected="true" /><select idref="V-228669" selected="true" /><select idref="V-228670" selected="true" /><select idref="V-228671" selected="true" /><select idref="V-228672" selected="true" /><select idref="V-228673" selected="true" /><select idref="V-228674" selected="true" /><select idref="V-228675" selected="true" /><select idref="V-228676" selected="true" /><select idref="V-228677" selected="true" /><select idref="V-228678" selected="true" /><select idref="V-268323" selected="true" /></Profile><Group id="V-228639"><title>SRG-APP-000065-NDM-000214</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228639r1082941_rule" weight="10.0" severity="medium"><version>PANW-NM-000015</version><title>The Palo Alto Networks security platform must enforce the limit of three consecutive invalid logon attempts.</title><description>&lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77195</ident><ident system="http://cyber.mil/legacy">V-62705</ident><ident system="http://cyber.mil/cci">CCI-000044</ident><fixtext fixref="F-30851r1082940_fix">Configure the authentication profile associated with the account of last resort with lockout settings of three failed attempts, which is the only local login account.

1. Go to Device &gt;&gt; Authentication Profile.
2. Select the configured authentication profile or select "Add" (in the bottom-left corner of the pane) to create a new one.
3. In the "Authentication Profile" field, enter the name of the authentication profile that will be used to control each person's authentication process.
4. The "Lockout Time (min)" field is the lockout duration; this must be set to "15". 
5. In the "Failed Attempts" field, enter "3".
6. Select "OK".</fixtext><fix id="F-30851r1082940_fix" /><check system="C-30874r1082939_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Authentication Profile.
Check the authentication profile used for the local account used for the account of last resort.

If the "Failed Attempts (#)" field is not set to "3", this is a finding.</check-content></check></Rule></Group><Group id="V-228640"><title>SRG-APP-000068-NDM-000215</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228640r960843_rule" weight="10.0" severity="low"><version>PANW-NM-000016</version><title>The Palo Alto Networks security platform must display the Standard Mandatory DoD Notice and Consent Banner before granting access to the device.</title><description>&lt;VulnDiscussion&gt;Display of the DoD-approved use notification before granting access to the network device ensures privacy and security notification verbiage used is consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.

System use notifications are required only for access via logon interfaces with human users.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77197</ident><ident system="http://cyber.mil/legacy">V-62707</ident><ident system="http://cyber.mil/cci">CCI-000048</ident><fixtext fixref="F-30852r513526_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management &gt;&gt; General Settings ("Edit" icon) &gt;&gt; Login Banner
Type in the required text
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30852r513526_fix" /><check system="C-30875r513525_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>View the logon screen of the Palo Alto Networks security platform.  A white text box at the bottom of the screen will contain the configured text.
If it is blank (there is no white text box) or the wording is not one of the approved banners, this is a finding.

This is the approved verbiage for applications that can accommodate banners of 1300 characters:
"You are accessing a U.S. Government (USG) Information System (IS) that is provided for USG-authorized use only.
By using this IS (which includes any device attached to this IS), you consent to the following conditions:
-The USG routinely intercepts and monitors communications on this IS for purposes including, but not limited to, penetration testing, COMSEC monitoring, network operations and defense, personnel misconduct (PM), law enforcement (LE), and counterintelligence (CI) investigations.
-At any time, the USG may inspect and seize data stored on this IS.
-Communications using, or data stored on, this IS are not private, are subject to routine monitoring, interception, and search, and may be disclosed or used for any USG-authorized purpose.
-This IS includes security measures (e.g., authentication and access controls) to protect USG interests--not for your personal benefit or privacy.
-Notwithstanding the above, using this IS does not constitute consent to PM, LE or CI investigative searching or monitoring of the content of privileged communications, or work product, related to personal representation or services by attorneys, psychotherapists, or clergy, and their assistants. Such communications and work product are private and confidential. See User Agreement for details."
Use the following verbiage for operating systems that have severe limitations on the number of characters that can be displayed in the banner:
"I've read &amp; consent to terms in IS user agreem't."</check-content></check></Rule></Group><Group id="V-228642"><title>SRG-APP-000091-NDM-000223</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228642r960885_rule" weight="10.0" severity="medium"><version>PANW-NM-000024</version><title>The Palo Alto Networks security platform must generate audit records when successful/unsuccessful attempts to access privileges occur.</title><description>&lt;VulnDiscussion&gt;Without generating audit records that are specific to the security and mission needs of the organization, it would be difficult to establish, correlate, and investigate the events relating to an incident or identify those responsible for one.  

By default, the Configuration Log contains the administrator username, client (Web or CLI), and date and time for any changes to configurations and for configuration commit actions.  The System Log also shows both successful and unsuccessful attempts for configuration commit actions.

The System Log and Configuration Log can be configured to send log messages by severity level to specific destinations; the Panorama management console, an SNMP console, an e-mail server, or a syslog server.  Since both the System Log and Configuration Log contain information concerning the use of privileges, both must be configured to send messages to a syslog server at a minimum.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77201</ident><ident system="http://cyber.mil/legacy">V-62711</ident><ident system="http://cyber.mil/cci">CCI-000172</ident><fixtext fixref="F-30854r513531_fix">Create a syslog server profile. 
Go to Device &gt;&gt; Server Profiles &gt;&gt; Syslog
Select "Add" 
In the "Syslog Server Profile", enter the name of the profile; select "Add".
In the "Servers" tab, enter the required information.
Name: Name of the syslog server
Server: Server IP address where the logs will be forwarded to
Port: Default port 514
Facility: Select from the drop down list
Select "OK".

Go to Device &gt;&gt; Log Settings &gt;&gt; System
For each severity level, select which destinations should receive the log messages.
Note: The "Syslog Profile" field must be completed.

Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30854r513531_fix" /><check system="C-30877r513530_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Log Settings &gt;&gt; System
If any severity level does not have a Syslog Profile, this is a finding.</check-content></check></Rule></Group><Group id="V-228643"><title>SRG-APP-000098-NDM-000228</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228643r960900_rule" weight="10.0" severity="low"><version>PANW-NM-000029</version><title>The Palo Alto Networks security platform must produce audit log records containing information (FQDN, unique hostname, management IP address) to establish the source of events.</title><description>&lt;VulnDiscussion&gt;In order to compile an accurate risk assessment and provide forensic analysis, it is essential for security personnel to know the source of the event.  The source may be a component, module, or process within the device or an external session, administrator, or device.  Associating information about where the source of the event occurred provides a means of investigating an attack; recognizing resource utilization or capacity thresholds; or identifying an improperly configured device.

The device must have a unique hostname that can be used to identify the device; fully qualified domain name (FQDN), hostname, or management IP address is used in audit logs to identify the source of a log message.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77203</ident><ident system="http://cyber.mil/legacy">V-62713</ident><ident system="http://cyber.mil/cci">CCI-000133</ident><fixtext fixref="F-30855r513534_fix">Set a unique hostname.
Go to Device &gt;&gt; Setup &gt;&gt; Management
in the "General Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "General Settings" window, in the "hostname" field; enter a unique hostname. 
Select "OK".

Configure the device to send the FQDN, hostname, ipv4-address, or ipv6-address with log messages.
Device &gt;&gt; Setup &gt;&gt; Management
Click the "Edit" icon in the "Logging and Reporting Settings" section.
Select the "Log Export and Reporting" tab.
Select one of the following options from the "Send Hostname in the Syslog" drop-down list:
FQDN — (the default) Concatenates the hostname and domain name defined on the sending device.
hostname — Uses the hostname defined on the sending device.
ipv4-address —Uses the IPv4 address of the interface used to send logs on the device. By default, this is the management interface of the device.
ipv6-address —Uses the IPv6 address of the interface used to send logs on the device. By default, this is the management interface of the device. 
Note that the last two selections must be consistent with the IP address used by the management interface.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.  Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30855r513534_fix" /><check system="C-30878r513533_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "General Settings" window, if the "hostname" field does not contain a unique identifier, this is a finding.

Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Logging and Reporting Settings" pane, if the "Send Hostname in Syslog" does not show either "FQDN", "hostname", "ipv4-address", or "ipv6-address", this is a finding.</check-content></check></Rule></Group><Group id="V-228645"><title>SRG-APP-000142-NDM-000245</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228645r1043177_rule" weight="10.0" severity="medium"><version>PANW-NM-000046</version><title>The Palo Alto Networks security platform must be configured to prohibit the use of all unnecessary and/or nonsecure functions, ports, protocols, and/or services, as defined in the PPSM CAL and vulnerability assessments.</title><description>&lt;VulnDiscussion&gt;In order to prevent unauthorized connection of devices, unauthorized transfer of information, or unauthorized tunneling (i.e., embedding of data types within data types), organizations must disable unused or unnecessary physical and logical ports/protocols on information systems.

Network devices are capable of providing a wide variety of functions and services. Some of the functions and services provided by default may not be necessary to support essential organizational operations. Additionally, it is sometimes convenient to provide multiple services from a single component (e.g., email and web services); however, doing so increases risk over limiting the services provided by any one component.

To support the requirements and principles of least functionality, the network device must support the organizational requirements providing only essential capabilities and limiting the use of ports, protocols, and/or services to only those required, authorized, and approved to conduct official business or to address authorized quality of life issues.

The Palo Alto Networks security platform uses a hardened operating system in which unnecessary services are not present.  The device has a DNS, NTP, update, and e-mail client installed.  Note that these are client applications and not servers; additionally, each has a valid purpose.  However, local policy may dictate that the update service, e-mail client, and statistics (reporting) service capabilities not be used. DNS can be either "Server" or "Proxy"; both are allowed unless local policy declares otherwise. NTP and SNMP are necessary functions.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77207</ident><ident system="http://cyber.mil/legacy">V-62717</ident><ident system="http://cyber.mil/cci">CCI-000382</ident><fixtext fixref="F-30857r513539_fix">Go to Device &gt;&gt; Setup &gt;&gt; Services
In the "Services" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
Note: DNS can be either "Server" or "Proxy"; both are allowed unless local policy declares otherwise.
Note: The Palo Alto Networks security platform cannot be a DNS server, only a client or proxy.

NTP is a necessary service.
Note: The Palo Alto Networks security platform cannot be an NTP server, only a client.

Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Management Interface Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Management Interface Settings" window, select HTTP OCSP, HTTPS, SSH,  SNMP, User-ID, User-ID Syslog Listener-SSL, User-ID Syslog Listener-UDP if these protocols will be used.  
Select "OK".
Note: SNMP Versions 1 and 2 are not considered secure; use SNMP Version 3.

Device &gt;&gt; Setup &gt;&gt; Operations tab&gt;&gt; Miscellaneous
Select SNMP Setup.
In the "SNMP Setup" window, select V3. 
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30857r513539_fix" /><check system="C-30880r513538_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Services
In the "Services" window, view which services are configured.
Note: DNS can be either "Server" or "Proxy"; both are allowed unless local policy declares otherwise.
Note: The Palo Alto Networks security platform cannot be a DNS server, only a client or proxy.

NTP is a necessary service.
Note: The Palo Alto Networks security platform cannot be an NTP server, only a client.

Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Management Interface Settings" window, view the enabled services.
Note: Which management services are enabled.  HTTPS, SSH, ping, and SNMP, are normally allowed.
  
If User-ID, User-ID Syslog Listener-SSL, User-ID Syslog Listener-UDP, or HTTP OCSP is present, verify with the ISSO that this has been authorized.
Go to Device &gt;&gt; Setup &gt;&gt; Operations tab&gt;&gt; Miscellaneous
Select SNMP Setup.
In the "SNMP Setup" window, check if SNMP V3 is selected.
If unauthorized services are configured, this is a finding.</check-content></check></Rule></Group><Group id="V-228647"><title>SRG-APP-000156-NDM-000250</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228647r960993_rule" weight="10.0" severity="medium"><version>PANW-NM-000051</version><title>The Palo Alto Networks security platform must implement replay-resistant authentication mechanisms for network access to privileged accounts.</title><description>&lt;VulnDiscussion&gt;A replay attack may enable an unauthorized user to gain access to the application. Authentication sessions between the authenticator and the application validating the user credentials must not be vulnerable to a replay attack.  An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message.

Techniques used to address this include protocols using nonces (e.g., numbers generated for a specific one-time use) or challenges (e.g., TLS, WS_Security). Additional techniques include time-synchronous or challenge-response one-time authenticators.  Of the three authentication protocols on the Palo Alto Networks security platform, only Kerberos is inherently replay-resistant.  If LDAP is selected, TLS must also be used.  If RADIUS is used, the device must be operating in FIPS mode.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77211</ident><ident system="http://cyber.mil/legacy">V-62721</ident><ident system="http://cyber.mil/cci">CCI-001941</ident><fixtext fixref="F-30859r513545_fix">To configure the Palo Alto Networks security platform to use an LDAP server with SSL/TLS.
Go to Device &gt;&gt; Server-Profiles &gt;&gt; LDAP
Select "Add" (lower left of window).
Populate the required fields.
Enter the name of the profile in the "Name" field.

In the server box:
Enter the name of the server in the "Name" field.
Enter the IP Address of the server. 
Enter the Port number the firewall should use to connect to the LDAP server (default=389 for LDAP; 636 for LDAP over SSL). 
Enter the LDAP Domain name to prepend to all objects learned from the server. The value entered here depends on the specific deployment. If using Active Directory, enter the NetBIOS domain name, not a FQDN (for example, enter acme, not acme.com). Note that if collecting data from multiple domains, it is necessary to create separate server profiles. If using a global catalog server, leave this field blank.
Select the Type of LDAP server connecting to. The correct LDAP attributes in the group mapping settings will automatically be populated based on the selection.
In the Base field, select the DN that corresponds to the point in the LDAP tree where the firewall is to begin its search for user and group information.
Select (check) the SSL checkbox.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.  Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30859r513545_fix" /><check system="C-30882r513544_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Ask the Administrator which form of centralized authentication server is being used. 
Navigate to the appropriate window to view the configured server(s). 
For RADIUS, go to Device &gt;&gt; Server Profiles &gt;&gt; RADIUS
For LDAP, go to Device &gt;&gt; Server Profiles &gt;&gt; LDAP
For Kerberos, go to Device &gt;&gt; Server Profiles &gt;&gt; Kerberos 

If Kerberos is used, this is a not finding.

If LDAP is used, view the LDAP Server Profile; if the SSL checkbox is not checked, this is a finding.

If RADIUS is used, use the command line interface to determine if the device is operating in FIPS mode. Enter the CLI command "show fips-mode" or the command show fips-cc (for more recent releases).

If FIPS mode is set to "off", this is a finding.</check-content></check></Rule></Group><Group id="V-228648"><title>SRG-APP-000164-NDM-000252</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228648r1018774_rule" weight="10.0" severity="medium"><version>PANW-NM-000053</version><title>If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce a minimum 15-character password length.</title><description>&lt;VulnDiscussion&gt;Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks. Password length is one factor of several that helps to determine strength and how long it takes to crack a password.

The shorter the password, the lower the number of possible combinations that needs to be tested before the password is compromised. Use of more characters in a password helps to exponentially increase the time and/or resources required to compromise the password.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77213</ident><ident system="http://cyber.mil/legacy">V-62723</ident><ident system="http://cyber.mil/cci">CCI-004066</ident><ident system="http://cyber.mil/cci">CCI-000205</ident><fixtext fixref="F-30860r997656_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Minimum Password Complexity" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Minimum Length" field, enter "15".
Check the "Enabled" box, then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30860r997656_fix" /><check system="C-30883r997655_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Minimum Password Complexity" window.
If the "Minimum Length" field is not "15", this is a finding.</check-content></check></Rule></Group><Group id="V-228650"><title>SRG-APP-000166-NDM-000254</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228650r1018775_rule" weight="10.0" severity="medium"><version>PANW-NM-000055</version><title>If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one uppercase character be used.</title><description>&lt;VulnDiscussion&gt;Use of a complex passwords helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.

Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password is, the greater the number of possible combinations that needs to be tested before the password is compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77217</ident><ident system="http://cyber.mil/legacy">V-62727</ident><ident system="http://cyber.mil/cci">CCI-004066</ident><ident system="http://cyber.mil/cci">CCI-000192</ident><fixtext fixref="F-30862r997659_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Minimum Password Complexity" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Minimum Uppercase Letters" field, enter "1".
Check the "Enabled" box, then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30862r997659_fix" /><check system="C-30885r997658_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Minimum Password Complexity" window.
If the "Minimum Uppercase Letters" field is not "1", this is a finding.</check-content></check></Rule></Group><Group id="V-228651"><title>SRG-APP-000167-NDM-000255</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228651r1018776_rule" weight="10.0" severity="medium"><version>PANW-NM-000056</version><title>If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one lowercase character be used.</title><description>&lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.

Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that needs to be tested before the password is compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77219</ident><ident system="http://cyber.mil/legacy">V-62729</ident><ident system="http://cyber.mil/cci">CCI-004066</ident><ident system="http://cyber.mil/cci">CCI-000193</ident><fixtext fixref="F-30863r997662_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Minimum Password Complexity" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Minimum Lowercase Letters" field, enter "1".
Check the "Enabled" box, then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30863r997662_fix" /><check system="C-30886r997661_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Minimum Password Complexity" window.
If the "Minimum Lowercase Letters" field is not "1", this is a finding.</check-content></check></Rule></Group><Group id="V-228652"><title>SRG-APP-000168-NDM-000256</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228652r1018777_rule" weight="10.0" severity="medium"><version>PANW-NM-000057</version><title>If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one numeric character be used.</title><description>&lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.

Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that needs to be tested before the password is compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77221</ident><ident system="http://cyber.mil/legacy">V-62731</ident><ident system="http://cyber.mil/cci">CCI-004066</ident><ident system="http://cyber.mil/cci">CCI-000194</ident><fixtext fixref="F-30864r997665_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Minimum Password Complexity" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Minimum Numeric Letters" field, enter "1".
Check the "Enabled" box, then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30864r997665_fix" /><check system="C-30887r997664_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Minimum Password Complexity" window.
If the "Minimum Numeric Letters" field is not "1", this is a finding.</check-content></check></Rule></Group><Group id="V-228653"><title>SRG-APP-000169-NDM-000257</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228653r1018778_rule" weight="10.0" severity="medium"><version>PANW-NM-000058</version><title>If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must enforce password complexity by requiring that at least one special character be used.</title><description>&lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, or strength, is a measure of the effectiveness of a password in resisting attempts at guessing and brute-force attacks.

Password complexity is one factor of several that determines how long it takes to crack a password. The more complex the password, the greater the number of possible combinations that needs to be tested before the password is compromised.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77223</ident><ident system="http://cyber.mil/legacy">V-62733</ident><ident system="http://cyber.mil/cci">CCI-004066</ident><ident system="http://cyber.mil/cci">CCI-001619</ident><fixtext fixref="F-30865r997668_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Minimum Password Complexity" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Minimum Special Letters" field, enter "1".
Check the "Enabled box", then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30865r997668_fix" /><check system="C-30888r997667_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Minimum Password Complexity" window.
If the "Minimum Special Letters" field is not "1", this is a finding.</check-content></check></Rule></Group><Group id="V-228654"><title>SRG-APP-000170-NDM-000329</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228654r1043189_rule" weight="10.0" severity="medium"><version>PANW-NM-000059</version><title>If multifactor authentication is not available and passwords must be used, the Palo Alto Networks security platform must require that when a password is changed, the characters are changed in at least 8 of the positions within the password.</title><description>&lt;VulnDiscussion&gt;If the application allows the user to consecutively reuse extensive portions of passwords, this increases the chances of password compromise by increasing the window of opportunity for attempts at guessing and brute-force attacks.

The number of changed characters refers to the number of changes required with respect to the total number of positions in the current password. In other words, characters may be the same within the two passwords; however, the positions of the like characters must be different.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77225</ident><ident system="http://cyber.mil/legacy">V-62735</ident><ident system="http://cyber.mil/cci">CCI-004066</ident><ident system="http://cyber.mil/cci">CCI-000195</ident><fixtext fixref="F-30866r997671_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Minimum Password Complexity" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "New Password Differs by Characters" field, enter "8".
Check the "Enabled box", then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30866r997671_fix" /><check system="C-30889r997670_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Minimum Password Complexity" window.
If the "New Password Differs by Characters" field is not "8", this is a finding.</check-content></check></Rule></Group><Group id="V-228655"><title>SRG-APP-000172-NDM-000259</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228655r961029_rule" weight="10.0" severity="medium"><version>PANW-NM-000061</version><title>The Palo Alto Networks security platform must prohibit the use of unencrypted protocols for network access to privileged accounts.</title><description>&lt;VulnDiscussion&gt;Passwords need to be protected at all times, and encryption is the standard method for protecting passwords. If passwords are not encrypted, they can be plainly read (i.e., clear text) and easily compromised.

Network devices can accomplish this by making direct function calls to encryption modules or by leveraging operating system encryption capabilities.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77227</ident><ident system="http://cyber.mil/legacy">V-62737</ident><ident system="http://cyber.mil/cci">CCI-000197</ident><fixtext fixref="F-30867r513569_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Management Interface Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).  In the "Management Interface Settings" window, make sure that HTTP and Telnet are not checked (enabled). 
If they are not checked, select either "OK" or "Cancel".
If either one is checked, select the check box to disable it, then select "OK".
If any changes were made, commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30867r513569_fix" /><check system="C-30890r513568_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management
View the "Management Interface Settings" pane.
If either Telnet or HTTP is listed in the "Services" field, this is a finding.</check-content></check></Rule></Group><Group id="V-228658"><title>SRG-APP-000190-NDM-000267</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228658r961068_rule" weight="10.0" severity="high"><version>PANW-NM-000069</version><title>The Palo Alto Networks security platform must terminate management sessions after 10 minutes of inactivity except to fulfill documented and validated mission requirements.</title><description>&lt;VulnDiscussion&gt;Terminating an idle session within a short time period reduces the window of opportunity for unauthorized personnel to take control of a management session enabled on the console or console port that has been left unattended. In addition, quickly terminating an idle session will also free up resources committed by the managed network element.

Terminating network connections associated with communications sessions includes, for example, de-allocating associated TCP/IP address/port pairs at the operating system level, or de-allocating networking assignments at the application level if multiple application sessions are using a single, operating system-level network connection. This does not mean that the device terminates all sessions or network access; it only ends the inactive session and releases the resources associated with that session.

Device management sessions are normally ended by the Administrator when he or she has completed the management activity.  The session termination takes place from the web client by selecting "Logout" (located at the bottom-left of the GUI window) or using the command line commands "exit" or "quit" at Operational mode.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77233</ident><ident system="http://cyber.mil/legacy">V-62743</ident><ident system="http://cyber.mil/cci">CCI-001133</ident><fixtext fixref="F-30870r513578_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Authentication Settings" pane, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Idle Timeout (min)" field, enter "10", then select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30870r513578_fix" /><check system="C-30893r513577_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management.
View the "Authentication Settings" pane.
If the "Idle Timeout (min)" field is not "10" or less, ask the Administrator to produce documentation signed by the Authorizing Official that the configured value exists to support mission requirements.
If this documentation is not made available, this is a finding.</check-content></check></Rule></Group><Group id="V-228659"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228659r961863_rule" weight="10.0" severity="medium"><version>PANW-NM-000075</version><title>Administrators in the role of Security Administrator,  Cryptographic Administrator, or Audit Administrator must not also have the role of Audit Administrator.</title><description>&lt;VulnDiscussion&gt;The Palo Alto Networks security platform has both pre-configured and configurable Administrator roles. Administrator roles determine the functions that the administrator is permitted to perform after logging in. Roles can be assigned directly to an administrator account, or define role profiles, which specify detailed privileges, and assign those to administrator accounts.

There are three preconfigured roles designed to comply with Common Criteria requirements - Security Administrator, Audit Administrator, and Cryptographic Administrator. Of the three, only the Audit Administrator can delete audit records.  The Palo Alto Networks security platform can use both pre-configured and configurable Administrator roles.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77235</ident><ident system="http://cyber.mil/legacy">V-62745</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-001314</ident><fixtext fixref="F-30871r864175_fix">Do not assign or configure more than one account to the same Administrator. Also, neither the Security Administrator nor the Cryptographic Administrator can be have the role of Audit Administrator.

Note that the system allows each account to have only one role assigned. However, individuals, either accidentally or intentionally, may have more than one account.</fixtext><fix id="F-30871r864175_fix" /><check system="C-30894r864174_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>For the roles of Security Administrator, Cryptographic Administrator, or Audit Administators, verify the same individual does not have more than one of these roles.

If the Palo Alto Networks security platform has any accounts where the same person is in the role of Security Administrator, Cryptographic Administrator, or Audit Administrator, this is a finding.</check-content></check></Rule></Group><Group id="V-228660"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228660r961863_rule" weight="10.0" severity="medium"><version>PANW-NM-000092</version><title>The Palo Alto Networks security platform must automatically lock the account until the locked account is released by an administrator when three unsuccessful logon attempts in 15 minutes are exceeded.</title><description>&lt;VulnDiscussion&gt;By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

This should not be configured in Device &gt;&gt; Setup &gt;&gt; Management &gt;&gt; Authentication Settings; instead, an authentication profile should be configured with lockout settings of three failed attempts and a lockout time of zero minutes.  The Lockout Time is the number of minutes that a user is locked out if the number of failed attempts is reached (0-60 minutes, default 0). 0 means that the lockout is in effect until it is manually unlocked.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77237</ident><ident system="http://cyber.mil/legacy">V-62747</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-002238</ident><fixtext fixref="F-30872r513584_fix">This should not be configured in Device &gt;&gt; Setup &gt;&gt; Management &gt;&gt; Authentication Settings; instead, an authentication profile should be configured with lockout settings of three failed attempts and a lockout time of zero minutes.
Go to Device &gt;&gt; Authentication Profile
Select the configured authentication profile, or select "Add" (in the bottom-left corner of the pane) to create a new one.
In the "Authentication Profile" field, enter the name of the authentication profile that will be used to control each person's authentication process.
The "Lockout Time (min)" field is the lockout duration; this must be set to "0".  This will keep the lockout in effect until it is manually unlocked.
In the "Failed Attempts" field, enter "3".
Select "OK".

Apply the authentication profile to the Administrator accounts.
Go to Device &gt;&gt; Administrators
Select each configured account, or select "Add" (in the bottom-left corner of the pane) to create a new one.
In the "Authentication Profile" field, enter the configured authentication profile.
Select "OK".

This authentication profile should not be applied to the emergency administration account since it has special requirements.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30872r513584_fix" /><check system="C-30895r513583_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Administrators.
If there is no authentication profile configured for each account (aside from the emergency administration account), this is a finding.

Note which authentication profile is used for each account.
Go to Device &gt;&gt; Authentication Profile.
Check the authentication profile used for each account (noted in the previous step). 
If the Lockout Time is not set to "0" (zero), this is a finding.</check-content></check></Rule></Group><Group id="V-228661"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228661r961863_rule" weight="10.0" severity="low"><version>PANW-NM-000096</version><title>The Palo Alto Networks security platform must generate an immediate alert when allocated audit record storage volume reaches 75% of repository maximum audit record storage capacity.</title><description>&lt;VulnDiscussion&gt;If security personnel are not notified immediately upon storage volume utilization reaching 75%, they are unable to plan for storage capacity expansion. This could lead to the loss of audit information. Note that while the network device must generate the alert, notification may be done by a management server.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77239</ident><ident system="http://cyber.mil/legacy">V-62749</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-001855</ident><fixtext fixref="F-30873r513587_fix">Go to Device &gt;&gt; Log Settings &gt;&gt; Alarms
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).

In the "Alarm Settings" window:
Select the "Enable Alarms" box.
In the "Traffic Log DB" field, enter "75".
In the "Threat Log DB" field, enter "75".
In the "Configuration Log DB" field, enter "75".
In the "System Log DB" field, enter "75".
In the "Alarm DB" field, enter "75".
In the "HIP Match Log DB" field, enter "75".
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.  Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30873r513587_fix" /><check system="C-30896r513586_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Log Settings &gt;&gt; Alarms
If the Traffic Log DB, Threat Log DB, Configuration Log DB, System Log DB, Alarm DB, and HIP Match Log DB fields are not "75", this is a finding.</check-content></check></Rule></Group><Group id="V-228662"><title>SRG-APP-000360-NDM-000295</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228662r997675_rule" weight="10.0" severity="low"><version>PANW-NM-000097</version><title>The Palo Alto Networks security platform must have alarms enabled.</title><description>&lt;VulnDiscussion&gt;It is critical for the appropriate personnel to be aware if a system is at risk of failing to process audit logs as required. Without a real-time alert, security personnel may be unaware of an impending failure of the audit capability, and system operation may be adversely affected. 

Alerts provide organizations with urgent messages. Real-time alerts provide these messages immediately (i.e., the time from event detection to alert occurs in seconds or less).&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77241</ident><ident system="http://cyber.mil/legacy">V-62751</ident><ident system="http://cyber.mil/cci">CCI-001858</ident><ident system="http://cyber.mil/cci">CCI-003831</ident><fixtext fixref="F-30874r997674_fix">Go to Device &gt;&gt; Log Settings &gt;&gt; Alarms.
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Alarm Settings" window; select the "Enable Alarms" box.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30874r997674_fix" /><check system="C-30897r997673_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Log Settings &gt;&gt; Alarms.
If the "Enable Alarms" box is not checked, this is a finding.</check-content></check></Rule></Group><Group id="V-228663"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228663r1018780_rule" weight="10.0" severity="low"><version>PANW-NM-000098</version><title>The Palo Alto Networks security platform must compare internal information system clocks at least every 24 hours with an authoritative time server.</title><description>&lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronizing internal information system clocks provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network.

Network Time Protocol (NTP) is used to synchronize the system clock of a computer to reference time source. The Palo Alto Networks security platform can be configured to use specified NTP servers. For synchronization with the NTP server(s), NTP uses a minimum polling value of 64 seconds and a maximum polling value of 1024 seconds. These minimum and maximum polling values are not configurable on the firewall.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77243</ident><ident system="http://cyber.mil/legacy">V-62753</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-004923</ident><ident system="http://cyber.mil/cci">CCI-001891</ident><fixtext fixref="F-30875r997677_fix">Go to Device &gt;&gt; Setup &gt;&gt; Services.
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Services" window, in the NTP tab, in the "Primary NTP Server Address" field and the "Secondary NTP Server Address" field, enter the IP address or hostname of the NTP servers.

In the "Authentication Type" field, select one of the following:
Symmetric Key; this option uses symmetric key exchange, which are shared secrets. Enter the key ID, algorithm, authentication key, and confirm the authentication key; for the algorithm, select "SHA1".
Autokey; this option uses auto key, or public key cryptography.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30875r997677_fix" /><check system="C-30898r997676_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Services.
In the "Services" window, the names or IP addresses of the Primary NTP Server and Secondary NTP Server must be present.
If the "Primary NTP Server" and "Secondary NTP Server" fields are blank, this is a finding.</check-content></check></Rule></Group><Group id="V-228664"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228664r1018781_rule" weight="10.0" severity="low"><version>PANW-NM-000099</version><title>The Palo Alto Networks security platform must synchronize internal information system clocks to the authoritative time source when the time difference is greater than one second.</title><description>&lt;VulnDiscussion&gt;Inaccurate time stamps make it more difficult to correlate events and can lead to an inaccurate analysis. Determining the correct time a particular event occurred on a system is critical when conducting forensic analysis and investigating system events. Synchronizing internal information system clocks provides uniformity of time stamps for information systems with multiple system clocks and systems connected over a network. 

The Palo Alto Networks security platform can be configured to use specified Network Time Protocol (NTP) servers. NTP is used to synchronize the system clock of a computer to reference time source. Sources outside of the configured acceptable allowance (drift) may be inaccurate. When properly configured, NTP will synchronize all participating computers to within a few milliseconds of the reference time source.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77245</ident><ident system="http://cyber.mil/legacy">V-62755</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-004926</ident><ident system="http://cyber.mil/cci">CCI-004923</ident><ident system="http://cyber.mil/cci">CCI-002046</ident><fixtext fixref="F-30876r997680_fix">Go to Device &gt;&gt; Setup &gt;&gt; Services.
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Services" window, in the "Primary NTP Server Address" field and the "Secondary NTP Server Address" field, enter the IP address or hostname of the NTP servers.

In the "Authentication Type" field, select one of the following:
None (default); this option disables NTP authentication.
Symmetric Key; this option uses symmetric key exchange, which are shared secrets. Enter the key ID, algorithm, authentication key, and confirm the authentication key.
Autokey; this option uses auto key, or public key cryptography.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30876r997680_fix" /><check system="C-30899r997679_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Services.
In the "Services" window, the names or IP addresses of the Primary NTP Server and Secondary NTP Server must be present.
If the "Primary NTP Server" and "Secondary NTP Server" fields are blank, this is a finding.</check-content></check></Rule></Group><Group id="V-228665"><title>SRG-APP-000373-NDM-000298</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228665r1018782_rule" weight="10.0" severity="medium"><version>PANW-NM-000100</version><title>The Palo Alto Networks security platform must be configured to synchronize internal information system clocks with the primary and secondary time sources located in different geographic regions using redundant authoritative time sources.</title><description>&lt;VulnDiscussion&gt;The loss of connectivity to a particular authoritative time source will result in the loss of time synchronization (free-run mode) and increasingly inaccurate time stamps on audit events and other functions. Multiple time sources provide redundancy by including a secondary source. Time synchronization is usually a hierarchy; clients synchronize time to a local source while that source synchronizes its time to a more accurate source. 

DOD-approved solutions consist of a combination of a primary and secondary time source using a combination or multiple instances of the following: a time server designated for the appropriate DOD network (NIPRNet/SIPRNet); United States Naval Observatory (USNO) time servers; and/or the Global Positioning System (GPS). The secondary time source must be located in a different geographic region from the primary time source.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77247</ident><ident system="http://cyber.mil/legacy">V-62757</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-004928</ident><ident system="http://cyber.mil/cci">CCI-004922</ident><ident system="http://cyber.mil/cci">CCI-001893</ident><fixtext fixref="F-30877r997683_fix">Go to Device &gt;&gt; Setup &gt;&gt; Services.
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Services" window, in the "Primary NTP Server Address" field and the "Secondary NTP Server Address" field, enter the IP address or hostname of the NTP servers.

In the "Authentication Type" field, select one of the following:
None (default); this option disables NTP authentication.
Symmetric Key; this option uses symmetric key exchange, which are shared secrets. Enter the key ID, algorithm, authentication key, and confirm the authentication key.
Autokey; this option uses auto key, or public key cryptography.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30877r997683_fix" /><check system="C-30900r997682_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Services.
If there is only one NTP Server configured, this is a finding.

Ask the firewall administrator where the Primary NTP Server and Secondary NTP Server are located; if they are not in different geographic regions, this is a finding.</check-content></check></Rule></Group><Group id="V-228666"><title>SRG-APP-000374-NDM-000299</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228666r961443_rule" weight="10.0" severity="medium"><version>PANW-NM-000101</version><title>The Palo Alto Networks security platform must record time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).</title><description>&lt;VulnDiscussion&gt;If time stamps are not consistently applied and there is no common time reference, it is difficult to perform forensic analysis.  Time stamps generated by the application include date and time and must be expressed in Coordinated Universal Time (UTC), also known as Zulu time, a modern continuation of Greenwich Mean Time (GMT).&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77249</ident><ident system="http://cyber.mil/legacy">V-62759</ident><ident system="http://cyber.mil/cci">CCI-001890</ident><fixtext fixref="F-30878r513602_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "General Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "General Settings" window, in the "Time Zone" field, select "GMT" or "UTC" from the list of time zones.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.  Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30878r513602_fix" /><check system="C-30901r513601_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "General Settings" window, if the time zone is not set to "GMT" or "UTC", this is a finding.</check-content></check></Rule></Group><Group id="V-228667"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228667r997687_rule" weight="10.0" severity="medium"><version>PANW-NM-000110</version><title>The Palo Alto Networks security platform must accept and verify Personal Identity Verification (PIV) credentials.</title><description>&lt;VulnDiscussion&gt;The use of PIV credentials facilitates standardization and reduces the risk of unauthorized access.

DOD has mandated the use of the CAC to support identity management and personal authentication for systems covered under HSPD 12 and as a primary component of layered protection for national security systems.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77251</ident><ident system="http://cyber.mil/legacy">V-62761</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-001953</ident><ident system="http://cyber.mil/cci">CCI-004068</ident><fixtext fixref="F-30879r997686_fix">Import the DOD CA certificates and subordinate certificates for all of the certificate authorities.
Go to Device &gt;&gt; Certificate Management &gt;&gt; Certificates.
Select the Import icon at the bottom of the pane.
In the Import Certificate window, complete the required information.
Select "OK".

Create a certificate profile.
Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the Authentication Settings pane, select the select the "Edit" icon (the gear symbol in the upper-right corner).
In the Authentication Settings window, complete the required information.
In the Authentication Profile field, select "None".
In the Certificate Profile field, select "New Certificate Profile". This will change the Authentication Settings window to the Certificate Profile window.
Leave the username field blank.
Leave the domain field blank.
 
In the Certificate Profile window, complete the required fields.
In the CA Certificates section, select "Add" to import the DOD certificate authorities.
Select the Use OCSP checkbox.
When importing the top level DOD CA Certificate, for the Default OCSP URL field, add the DOD/DISA OCSP URL.
Select "OK".
Select "OK" again.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30879r997686_fix" /><check system="C-30902r997685_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Certificate Management &gt;&gt; Certificates.
If no DOD Certification Authority (CA) certificates and subordinate certificates are imported, this is a finding.

Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the Authentication Settings pane, if the Certificate Profile field is blank, this is a finding.

View the Certificate Profile, if it does not list the DOD CA certificates and subordinate certificates, this is a finding.

If the Use OCSP checkbox is not selected, this is a finding.</check-content></check></Rule></Group><Group id="V-228669"><title>SRG-APP-000411-NDM-000330</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228669r961554_rule" weight="10.0" severity="medium"><version>PANW-NM-000117</version><title>The Palo Alto Networks security platform must only allow the use of secure protocols that implement cryptographic mechanisms to protect the integrity of maintenance and diagnostic communications for nonlocal maintenance sessions.</title><description>&lt;VulnDiscussion&gt;This requires the use of secure protocols instead of their unsecured counterparts, such as SSH instead of telnet, SCP instead of FTP, and HTTPS instead of HTTP. Note that HTTP OCSP is permitted to support OCSP where used. If unsecured protocols (lacking cryptographic mechanisms) are used for sessions, the contents of those sessions will be susceptible to manipulation, potentially allowing alteration and hijacking of maintenance sessions.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77255</ident><ident system="http://cyber.mil/legacy">V-62765</ident><ident system="http://cyber.mil/cci">CCI-002890</ident><fixtext fixref="F-30881r513611_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management.
In the "Management Interface Settings" window, select the "Edit" icon (the gear symbol in the upper-right corner).
In the "Management Interface Settings" window, make sure that Telnet or HTTP are not selected.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30881r513611_fix" /><check system="C-30904r513610_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Management Interface Settings" window, view the enabled services.  
Note: Which management services are enabled.

If Telnet or HTTP is selected, this is a finding.</check-content></check></Rule></Group><Group id="V-228670"><title>SRG-APP-000412-NDM-000331</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228670r961557_rule" weight="10.0" severity="high"><version>PANW-NM-000118</version><title>The Palo Alto Networks security platform must not use SNMP Versions 1 or 2.</title><description>&lt;VulnDiscussion&gt;SNMP Versions 1 and 2 are not considered secure. Without the strong authentication and privacy that is provided by the SNMP Version 3 User-based Security Model (USM), an unauthorized user can gain access to network management information used to launch an attack against the network.  SNMP Versions 1 and 2 cannot authenticate the source of a message nor can they provide encryption. Without authentication, it is possible for nonauthorized users to exercise SNMP network management functions. It is also possible for nonauthorized users to eavesdrop on management information as it passes from managed systems to the management system.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77257</ident><ident system="http://cyber.mil/legacy">V-62767</ident><ident system="http://cyber.mil/cci">CCI-003123</ident><fixtext fixref="F-30882r513614_fix">Go to Device &gt;&gt; Setup &gt;&gt; Operations; in the Miscellaneous pane, select SNMP Setup.
In the SNMP Setup window, complete the required fields.
For the Version, select V3.
Configure a view and assign it to a user.
In the upper half of the SNMP Setup window, select "Add".
In the Views window, complete the required fields; obtain the values for the OID and Mask fields from product documentation or vendor support.
In the Option field, select "include". 
Select "OK".
In the lower half of the SNMP Setup window, select "Add".
Complete the required fields.
Select "OK".
Obtain the engineID of the Palo Alto device by issuing an SNMPv3 GET from the management workstation against the OID of the Palo Alto device.
Configure the SNMPv3 Trap Server profile; go to Device &gt;&gt; Server Profiles &gt;&gt; SNMP Trap; select "Add".
In the SNMP Trap Server Profile window, complete the required fields. 
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30882r513614_fix" /><check system="C-30905r513613_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Operations; in the Miscellaneous pane, select SNMP Setup.
In the SNMP Setup window, check if SNMP V3 is selected.  
If V3 is not selected, this is a finding.

Go to Device &gt;&gt; Server Profiles &gt;&gt; SNMP Trap.
View the list of configured SNMP servers; if the Version is not "v3", this is a finding.</check-content></check></Rule></Group><Group id="V-228671"><title>SRG-APP-000515-NDM-000325</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228671r961860_rule" weight="10.0" severity="medium"><version>PANW-NM-000128</version><title>The Palo Alto Networks security platform must off-load audit records onto a different system or media than the system being audited.</title><description>&lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration.  Off-loading is a common process in information systems with limited audit storage capacity.

The Palo Alto Networks security platform has multiple log types; at a minimum, the Traffic, Threat, System, and Configuration logs must be sent to a Syslog server.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77259</ident><ident system="http://cyber.mil/legacy">V-62769</ident><ident system="http://cyber.mil/cci">CCI-001851</ident><fixtext fixref="F-30883r513617_fix">To create a syslog server profile:
Go to Device &gt;&gt; Server Profiles &gt;&gt; Syslog
Select "Add". 
In the Syslog Server Profile, enter the name of the profile.
Select "Add".
In the "Servers" tab, enter the required information.
Name: Name of the syslog server
Server: Server IP address where the logs will be forwarded to
Port: Default port 514
Facility: Select from the drop-down list.
Select "OK".

After creating the Server Profiles that define where to logs, enable log forwarding.  
The way to enable forwarding depends on the log type:
Traffic Logs—Enable forwarding of Traffic logs by creating a Log Forwarding Profile (Objects &gt;&gt; Log Forwarding) and adding it to the security policies to trigger the log forwarding. Only traffic that matches a specific rule within the security policy will be logged and forwarded.
Configure the log-forwarding profile to select the logs to be forwarded to syslog server.
Go to Objects &gt;&gt; Log forwarding
The Log Forwarding Profile window appears.  Note that it has five columns.  In the Syslog column, select the syslog server profile for forwarding threat logs to the configured server(s).
Select "OK".

When the Log Forwarding Profile window disappears, the screen will show the configured log-forwarding profile.
Threat Logs—Enable forwarding of Threat logs by creating a Log Forwarding Profile (Objects &gt;&gt; Log Forwarding) that specifies which severity levels to forward and then adding it to the security policies, which triggers the log forwarding. A Threat log entry will only be created (and therefore forwarded) if the associated traffic matches a Security Profile (Antivirus, Anti-spyware, Vulnerability, URL Filtering, File Blocking, Data Filtering, or DoS Protection).
Configure the log-forwarding profile to select the logs to be forwarded to syslog server.
Go to Objects &gt;&gt; Log forwarding
The Log Forwarding Profile window appears.  Note that it has five columns.  In the "Syslog" column, select the syslog server profile for forwarding threat logs to the configured server(s).
Select "OK".

When the Log Forwarding Profile window disappears, the screen will show the configured log-forwarding profile.
System Logs—Enable forwarding of System logs by specifying a Server Profile in the log settings configuration. 
Go to Device &gt;&gt; Log Settings &gt;&gt; System Logs
The list of severity levels is displayed.
Select a Server Profile for each severity level to forward.  
Select each severity level in turn; with each selection, the "Log Systems - Setting" window will appear.  
In the "Log Systems - Setting" window, in the "Syslog drop-down" box, select the configured Server Profile.
Select "OK". 
Config Logs—Enable forwarding of Config logs by specifying a Server Profile in the log settings configuration. 
Go to Device &gt;&gt; Log Settings &gt;&gt; Config Logs
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Log Settings Config" window, in the "Syslog drop-down" box, select the configured Server Profile.
Select "OK".

For Traffic Logs and Threat Logs, use the log forwarding profile in the security rules.
Go to Policies &gt;&gt; Security Rule
Select the rule for which the log forwarding needs to be applied.
Apply the security profiles to the rule.
Go to Actions &gt;&gt; Log forwarding
Select the log forwarding profile from drop-down list.
Commit changes by selecting "Commit" in the upper-right corner of the screen.  Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30883r513617_fix" /><check system="C-30906r513616_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>To view a syslog server profile,
Go to Device &gt;&gt; Server Profiles &gt;&gt; Syslog
If there are no Syslog Server Profiles present, this is a finding.

Select each Syslog Server Profile.
If no server is configured, this is a finding.

View the log-forwarding profile to determine which logs are forwarded to the syslog server.
Go to Objects &gt;&gt; Log forwarding
If no Log Forwarding Profile is present, this is a finding.

The "Log Forwarding Profile" window has five columns.  
If there are no Syslog Server Profiles present in the Syslog column for the Traffic Log Type, this is a finding.

If there are no Syslog Server Profiles present for each of the severity levels of the Threat Log Type, this is a finding.
 
Go to Device &gt;&gt; Log Settings &gt;&gt; System Logs
The list of Severity levels is displayed.  
If any of the Severity levels does not have a configured Syslog Profile, this is a finding.

Go to Device &gt;&gt; Log Settings &gt;&gt; Config Logs
If the "Syslog" field is blank, this is a finding.</check-content></check></Rule></Group><Group id="V-228672"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228672r997690_rule" weight="10.0" severity="medium"><version>PANW-NM-000131</version><title>The Palo Alto Networks security platform must use automated mechanisms to alert security personnel to threats identified by authoritative sources (e.g., CTOs) and IAW CJCSM 6510.01B.</title><description>&lt;VulnDiscussion&gt;CJCSM 6510.01B, "Cyber Incident Handling Program", in subsection e.(6)(c) sets forth three requirements for Cyber events detected by an automated system:
If the cyber event is detected by an automated system, an alert will be sent to the POC designated for receiving such automated alerts.
CC/S/A/FAs that maintain automated detection systems and sensors must ensure that a POC for receiving the alerts has been defined and that the IS configured to send alerts to that POC.
The POC must then ensure that the cyber event is reviewed as part of the preliminary analysis phase and reported to the appropriate individuals if it meets the criteria for a reportable cyber event or incident.

By immediately displaying an alarm message, potential security violations can be identified more quickly even when administrators are not logged on to the network device. An example of a mechanism to facilitate this would be through the utilization of SNMP traps.

The Palo Alto Networks security platform can be configured to send messages to an SNMP server and to an email server as well as a Syslog server. SNMP traps can be generated for each of the five logging event types on the firewall: traffic, threat, system, hip, config. For this requirement, only the threat logs must be sent. Note that only traffic that matches an action in a rule will be logged and forwarded. In the case of traps, the messages are initiated by the firewall and sent unsolicited to the management stations. 

The use of email as a notification method may result in a very larger number of messages being sent and possibly overwhelming the email server as well as the POC. The use of SNMP is preferred over email in general, but organizations may want to use email in addition to SNMP for high-priority messages.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77261</ident><ident system="http://cyber.mil/legacy">V-62771</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-001274</ident><ident system="http://cyber.mil/cci">CCI-003831</ident><fixtext fixref="F-30884r997689_fix">For SNMP traps, follow the following steps:
Configure the SNMP Trap Destinations; go to Device &gt;&gt; Server Profiles &gt;&gt; SNMP Trap.
Select "Add".

In the "SNMP Trap Server Profile" window, enter the required information.
For SNMP Version, select "V3". 
Enter the name of the SNMP Server Profile.
Select "Add". 
Server—Specify the SNMP trap destination name (up to 31 characters).
Manager—Specify the IP address of the trap destination.
User—Specify the SNMP user.
EngineID—Specify the engine ID of the firewall. The input is a string in hexadecimal representation. The engine ID is any number between 5 to 64 bytes. When represented as a hexadecimal string, this is between 10 and 128 characters (2 characters for each byte) with two additional characters for 0x that must be used as a prefix in the input string.
Auth Password—Specify the user’s authentication password (minimum 8 characters, maximum of 256 characters, and no character restrictions). Only Secure Hash Algorithm (SHA) is supported.
Priv Password—Specify the user’s encryption password (minimum 8 characters, maximum of 256 characters, and no character restrictions). Only Advanced Encryption Standard (AES) is supported.
Select "OK".

Configure generating "Traps for Threat" events:
Go to Objects &gt;&gt; Log Forwarding.
Select "Add".
In the "Log Forwarding Profile" window, enter the required information.
Enter the name of the Log Forwarding Profile.
In the "Threat Settings" section, in the "SNMP Trap" field for each Severity, select the SNMP Trap Server Profile.
Select "OK".

Add the Log Forwarding Profile to the security policies to trigger log forwarding to the SNMP server.
Go to Policies &gt;&gt; Security.
Select the rule for which the log forwarding needs to be applied. Apply the security profiles to the rule.
Go to "Actions" (tab); in the "Log forwarding" field, select the "log forwarding" profile.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30884r997689_fix" /><check system="C-30907r997688_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Note: The actual method is determined by the organization.
Review the system/network documentation to determine who the Points of Contact are and which methods are being used. 
If the selected method is SNMP, verify that the device is configured.
Go to Device &gt;&gt; Server Profiles.
If no SNMP servers are configured, this is a finding.
 
Go to Objects &gt;&gt; Log Forwarding.
If no Log Forwarding Profile is listed, this is a finding.

If the "Log Type" column does not include "Threat", this is a finding.

If any Severity is not listed, this is a finding.</check-content></check></Rule></Group><Group id="V-228673"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228673r1082978_rule" weight="10.0" severity="medium"><version>PANW-NM-000136</version><title>The Palo Alto Networks security platform must employ centrally managed authentication server(s).</title><description>&lt;VulnDiscussion&gt;The use of authentication servers or other centralized management servers for providing centralized authentication services is required for network device management. Maintaining local administrator accounts for daily usage on each network device without centralized management is not scalable or feasible. Without centralized management, it is likely that credentials for some network devices will be forgotten, leading to delays in administration, which itself leads to delays in remediating production problems and in addressing compromises in a timely fashion.

Only the emergency administration account, also known as the account of last resort, can be locally configured on the device.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77263</ident><ident system="http://cyber.mil/legacy">V-62773</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-000372</ident><fixtext fixref="F-30885r1082978_fix">The device allows three different authentication protocols: RADIUS, LDAP, and Kerberos. In this explanation, LDAP is used. 

To configure the Palo Alto Networks security platform to use an LDAP server, follow these steps:
1. Go to Device &gt;&gt; Server-Profiles &gt;&gt; LDAP.
2. Select "Add" (lower left of window).
3. Populate the required fields.
a. Enter the name of the profile in the "Name" field.
b. In the server box enter the name of the server in the "Name" field.
c. Enter the IP Address of the server. 
d. Enter the Port number the firewall should use to connect to the LDAP server (default=389 for LDAP; 636 for LDAP over SSL). 
e. Enter the LDAP Domain name to prepend to all objects learned from the server. The value entered here depends on the specific deployment. If using Active Directory, enter the NetBIOS domain name; not an FQDN (for example, enter acme, not acme.com). Note that if collecting data from multiple domains, it is necessary to create separate server profiles. If using a global catalog server, leave this field blank.
4. Select the Type of LDAP server that will be connected. The correct LDAP attributes in the group mapping settings will automatically be populated based on the selection.
5. In the Base field, select the DN that corresponds to the point in the LDAP tree where the firewall is to begin its search for user and group information.
6. Select the SSL checkbox.
7. Select "OK".

To create an Authentication Profile using the newly created LDAP server, follow these steps:
1. Go to Device &gt;&gt; Authentication Profile.
2. Select "Add" (lower left of window).
3. Populate the required fields as needed.
a. In the Authentication field, select "LDAP".
b. In the Server Profile field, select the configured LDAP server profile.
c. In the Login Attribute field, enter “sAMAccountName”. 
4. Select "OK".

Apply the authentication profile to the Administrator accounts.
1. Go to Device &gt;&gt; Administrators.
2. Select each configured account or select "Add" (in the bottom-left corner of the pane) to create a new one.
3. In the "Authentication Profile" field, enter the configured LDAP authentication profile.
4. Select "OK".

Note: The name of the administrator must match the name of the user in the LDAP server.
Note: The authentication profile must not be applied to the emergency administration account since it has special requirements.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.

Note that the emergency administration account is the only account that is configured locally on the device itself.</fixtext><fix id="F-30885r1082978_fix" /><check system="C-30908r1082945_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Ask the administrator which form of centralized authentication server is being used. This requirement is not applicable to the local account of last resort.

Navigate to the appropriate window to view the configured server(s). 
For RADIUS, go to Device &gt;&gt; Server Profiles &gt;&gt; RADIUS.
For LDAP, go to Device &gt;&gt; Server Profiles &gt;&gt; LDAP.
For Kerberos, go to Device &gt;&gt; Server Profiles &gt;&gt; Kerberos.

If there are no servers configured in the window that match the specified form of centralized authentication, this is a finding.</check-content></check></Rule></Group><Group id="V-228674"><title>SRG-APP-000516-NDM-000344</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228674r961863_rule" weight="10.0" severity="medium"><version>PANW-NM-000141</version><title>The Palo Alto Networks security platform must use DoD-approved PKI rather than proprietary or self-signed device certificates.</title><description>&lt;VulnDiscussion&gt;DoD Instruction 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling mandates that certificates must be issued by the DoD PKI or by a DoD-approved PKI for authentication, digital signature, or encryption.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77267</ident><ident system="http://cyber.mil/legacy">V-62777</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-001159</ident><fixtext fixref="F-30886r513626_fix">Obtain a Device Certificate from the DoD PKI or from a DoD-approved PKI:
Go to Device &gt;&gt; Certificate Management &gt;&gt; Certificates
Select "Import" (at the bottom of the pane). 
In the "Import Certificate" pane, complete each field.
Select "OK".</fixtext><fix id="F-30886r513626_fix" /><check system="C-30909r513625_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Certificate Management &gt;&gt; Certificates
Installed Certificates are listed in the "Device Certificates" tab.
If any of the have the name or identifier of a non-approved source in the "Issuer" field, this is a finding.</check-content></check></Rule></Group><Group id="V-228675"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228675r961863_rule" weight="10.0" severity="medium"><version>PANW-NM-000142</version><title>The Palo Alto Networks security platform must not use Password Profiles.</title><description>&lt;VulnDiscussion&gt;Password profiles override settings made in the Minimum Password Complexity window.  If Password Profiles are used they can bypass password complexity requirements.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77269</ident><ident system="http://cyber.mil/legacy">V-62779</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><fixtext fixref="F-30887r513629_fix">Go to Device &gt;&gt; Password Profiles
If the screen is blank (no configured Password Profiles), do nothing.

If there are configured Password Profiles, identify which accounts are using them and bring this to the attention of the ISSO immediately.
Delete the Password Profiles when authorized to make changes to the device in accordance with local change management policies.</fixtext><fix id="F-30887r513629_fix" /><check system="C-30910r513628_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Password Profiles
If there are configured Password Profiles, this is a finding.</check-content></check></Rule></Group><Group id="V-228676"><title>SRG-APP-000516-NDM-000317</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228676r961863_rule" weight="10.0" severity="high"><version>PANW-NM-000143</version><title>The Palo Alto Networks security platform must not use the default admin account password.</title><description>&lt;VulnDiscussion&gt;To assure accountability and prevent unauthenticated access, organizational administrators must be uniquely identified and authenticated for all network management accesses to prevent potential misuse and compromise of the system.

The use of a default password for any account, especially one for administrative access, can quickly lead to a compromise of the device and subsequently, the entire enclave or system.  The "admin" account is intended solely for the initial setup of the device and must be disabled when the device is initially configured.  The default password for this account must immediately be changed at the first login of an authorized administrator.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77271</ident><ident system="http://cyber.mil/legacy">V-62781</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><ident system="http://cyber.mil/cci">CCI-000764</ident><fixtext fixref="F-30888r513632_fix">Go to Device &gt;&gt; Administrators
Select the admin user.
In the "Old Password" field, enter "admin".
In the "New Password" field, enter the new password.
In the "Confirm New Password" field, enter the new password.
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30888r513632_fix" /><check system="C-30911r513631_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Open a web browser at an authorized workstation and enter the management IP address of the Palo Alto Networks security platform.
Use HTTP Secure (HTTPS) instead of HTTP since HTTP is disabled by default.
The logon window will appear.
Enter "admin" into both the "Name" and "Password" fields.  
If anything except the logon screen with the message "Invalid username or password" appears, this is a finding.</check-content></check></Rule></Group><Group id="V-228677"><title>SRG-APP-000516-NDM-000334</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228677r961863_rule" weight="10.0" severity="medium"><version>PANW-NM-000144</version><title>The Palo Alto Networks security platform must generate an audit log record when the Data Plane CPU utilization is 100%.</title><description>&lt;VulnDiscussion&gt;Auditing and logging are key components of any security architecture. Logging the actions of specific events provides a means to investigate an attack; to recognize resource utilization or capacity thresholds; or to identify an improperly configured network device. If auditing is not comprehensive, it will not be useful for intrusion monitoring, security investigations, and forensic analysis.

If the Data Plane CPU utilization is 100%, this may indicate an attack or simply an over-utilized device.  In either case, action must be taken to identify the source of the issue and take corrective action.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77273</ident><ident system="http://cyber.mil/legacy">V-62783</ident><ident system="http://cyber.mil/cci">CCI-000366</ident><fixtext fixref="F-30889r513635_fix">Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Logging and Reporting Settings" pane, select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Log Export and Reporting" tab, select the "Enable Log on High DP Load" check box.  
Select "OK".
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30889r513635_fix" /><check system="C-30912r513634_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Management
In the "Logging and Reporting Settings" pane.
If the "Enable Log on High DP Load" check box is not selected, this is a finding.</check-content></check></Rule></Group><Group id="V-228678"><title>SRG-APP-000395-NDM-000310</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-228678r961506_rule" weight="10.0" severity="medium"><version>PANW-NM-000145</version><title>The Palo Alto Networks security platform must authenticate Network Time Protocol sources.</title><description>&lt;VulnDiscussion&gt;If Network Time Protocol is not authenticated, an attacker can introduce a rogue NTP server.  This rogue server can then be used to send incorrect time information to network devices, which will make log timestamps inaccurate and affected scheduled actions.  NTP authentication is used to prevent this tampering by authenticating the time source.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/legacy">SV-77275</ident><ident system="http://cyber.mil/legacy">V-62785</ident><ident system="http://cyber.mil/cci">CCI-001967</ident><fixtext fixref="F-30890r513638_fix">Go to Device &gt;&gt; Setup &gt;&gt; Services
Select the "Edit" icon (the gear symbol in the upper-right corner of the pane).
In the "Services" window, in the NTP tab, in the "Primary NTP Server Address" field and the "Secondary NTP Server Address" field, enter the IP address or hostname of the NTP servers.

In the "Authentication Type" field, select one of the following:
Symmetric Key; this option uses symmetric key exchange, which are shared secrets. Enter the key ID, algorithm, authentication key, and confirm the authentication key; for the algorithm, select "SHA1".
Autokey; this option uses auto key, or public key cryptography.
Commit changes by selecting "Commit" in the upper-right corner of the screen.
Select "OK" when the confirmation dialog appears.</fixtext><fix id="F-30890r513638_fix" /><check system="C-30913r513637_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Go to Device &gt;&gt; Setup &gt;&gt; Services
In the "Services" window, the Primary NTP Server Authentication Type and Secondary NTP Server Authentication Type must be either Symmetric Key or Autokey. If the "Primary NTP Server Authentication Type" and "Secondary NTP Server Authentication Type" fields are "none", this is a finding.</check-content></check></Rule></Group><Group id="V-268323"><title>SRG-APP-000148-NDM-000346</title><description>&lt;GroupDescription&gt;&lt;/GroupDescription&gt;</description><Rule id="SV-268323r1084266_rule" weight="10.0" severity="medium"><version>PANW-NM-000048</version><title>The Palo Alto device must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.</title><description>&lt;VulnDiscussion&gt;Authentication for administrative (privileged level) access to the device is required at all times. An account can be created on the device's local database for use when the authentication server is down or connectivity between the device and the authentication server is not operable. This account is referred to as the account of last resort since it is intended to be used as a last resort and when immediate administrative access is absolutely necessary.

The account of last resort logon credentials must be stored in a sealed envelope and kept in a safe. The safe must be periodically audited to verify the envelope remains sealed. The signature of the auditor and the date of the audit must be added to the envelope as a record. Administrators must secure the credentials and disable the root account (if possible) when not needed for system administration functions.&lt;/VulnDiscussion&gt;&lt;FalsePositives&gt;&lt;/FalsePositives&gt;&lt;FalseNegatives&gt;&lt;/FalseNegatives&gt;&lt;Documentable&gt;false&lt;/Documentable&gt;&lt;Mitigations&gt;&lt;/Mitigations&gt;&lt;SeverityOverrideGuidance&gt;&lt;/SeverityOverrideGuidance&gt;&lt;PotentialImpacts&gt;&lt;/PotentialImpacts&gt;&lt;ThirdPartyTools&gt;&lt;/ThirdPartyTools&gt;&lt;MitigationControl&gt;&lt;/MitigationControl&gt;&lt;Responsibility&gt;&lt;/Responsibility&gt;&lt;IAControls&gt;&lt;/IAControls&gt;</description><reference><dc:title>DPMS Target Palo Alto Networks NDM</dc:title><dc:publisher>DISA</dc:publisher><dc:type>DPMS Target</dc:type><dc:subject>Palo Alto Networks NDM</dc:subject><dc:identifier>4232</dc:identifier></reference><ident system="http://cyber.mil/cci">CCI-001358</ident><ident system="http://cyber.mil/cci">CCI-002111</ident><fixtext fixref="F-72248r1084265_fix">Remove local users other than the designated account of last resort.

Using the Console UI:
Navigate to Device &gt;&gt; Administrators.
Select and delete local users other than the account of last resort.

Note: To protect against brute-force attacks, delete the default admin account by creating a new superuser administrator account, logging out, and logging back in using the new account.</fixtext><fix id="F-72248r1084265_fix" /><check system="C-72345r1082942_chk"><check-content-ref href="Palo_Alto_Networks_NDM_STIG.xml" name="M" /><check-content>Navigate to Device &gt;&gt; Administrators.
Review the user list.

If there is an authentication profile/user account configured (and enabled) for any account other than the emergency administration account, this is a finding.</check-content></check></Rule></Group></Benchmark>