STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to DBN-6300 NDM Security Technical Implementation Guide

V-255533

CAT II (Medium)

The DBN-6300 must enforce the limit of three consecutive invalid logon attempts by a user during a 15-minute time period.

Rule ID

SV-255533r960840_rule

STIG

DBN-6300 NDM Security Technical Implementation Guide

Version

V1R2

CCIs

CCI-000044

Discussion

By limiting the number of failed logon attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute-forcing, is reduced. It is possible to set a time-to-retry variable, as well as number of retries during that lockout timeout variable, within the DBN-6300.

Check Content

To see if the system will lock out the user if three failed logon attempts occur within 15 minutes, attempt to log on as a user three times in succession and deliberately fail (by entering the wrong password).

After the third attempt, the user will be locked out from retrying until the oldest attempt (by time) ages out past the 15-minute mark and then will be allowed to try again.

If the user is not locked out after three failed logon attempts within 15 minutes, this is a finding.

Fix Text

Set a time-to-retry variable, as well as number of retries during that lockout timeout variable, within the DBN-6300 through the CLI.

This value is set with the following registry entry in the CLI:

reg set /sysconfig/auth/01 {"stores": { "local": { "policies": { "passwordFail": { "enable": true, "threshold": 3, "windowSeconds": 60 }}}}}