STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Ivanti Sentry 9.x NDM Security Technical Implementation Guide

V-250986

CAT III (Low)

Sentry must be configured to enforce the limit of three consecutive invalid logon attempts, after which time it must block any login attempt for 15 minutes.

Rule ID

SV-250986r1028213_rule

STIG

Ivanti Sentry 9.x NDM Security Technical Implementation Guide

Version

V3R1

CCIs

CCI-000044

Discussion

By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced.

Check Content

Review Sentry configuration to verify that it enforces the limit of three consecutive invalid logon attempts. 

1. Log in to Sentry System Manager portal.
2. Go to the "Security" tab. 
3. Go to "Password Policy". 
4. Look for "Number of Failed Attempts" and determine if the value is set to 3. If it is not, this is a finding.
5. Verify the Auto-Lock Time value is set to 900 seconds or more. 

If the Auto-Lock Time is not set to 900 seconds or more, this is a finding.

Fix Text

Configure Sentry to enforce the limit of three consecutive invalid login attempts during a 15-minute time period.

1. Log in to Sentry System Manager portal.
2. Go to the "Security" tab.
3. Go to "Password Policy".
4. For "Number of Failed Attempts", set value to 3.
5. For "Auto-Lock Time", set value to 900 seconds or more.