STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung SDS EMM Security Technical Implementation Guide

V-225656

CAT II (Medium)

The Samsung SDS EMM must enforce the limit of three consecutive invalid logon attempts by a user.

Rule ID

SV-225656r588007_rule

STIG

Samsung SDS EMM Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-000044

Discussion

By limiting the number of failed login attempts, the risk of unauthorized system access via user password guessing, otherwise known as brute forcing, is reduced. Limits are imposed by locking the account. SFR ID: FMT_SMF.1(2)b. / IA-7-a Satisfies: SRG-APP-000065, PP-MDM-991000

Check Content

Review the Samsung SDS EMM configuration settings and verify the server is configured to enforce the limit of three consecutive invalid logon attempts by admin.

On the MDM console, verify that the MDM console "Maximum Failed Login Attempts" is set to "3".  

If the administrator incorrectly enters the login password three times, the account is locked.

If the MDM console Maximum Failed Login Attempts is not set to "3", this is a finding.

Fix Text

Configure the Samsung SDS EMM to enforce the limit of three consecutive invalid logon attempts by an admin.

On the MDM console, do the following:
1. Log in to the Admin Console using a web browser.
2. Go to Setting >> Server >> Configuration and set "Maximum Failed Login Attempts" to "3".