Skip to main content
CUI

Vulnerability V-259411

Back

V-259411

CAT II

The DNS server implementation must employ strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.

Ships Affected
1
Total Findings
1
Open
1
Closed
0

Check Text

Review the DNS implementation's authentication methods and settings to determine if multifactor authentication is used to gain nonlocal access for maintenance and diagnostics. If multifactor authentication is not used, this is a finding.

Fix Text

Configure the DNS system to use multifactor authentication for nonlocal access for maintenance and diagnostics.

STIG Reference

STIG
Microsoft Windows Server Domain Name System (DNS) Security Technical Implementation Guide
Version
2
Release
4
Rule ID
SV-259411r961062_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONT-DC-003/Checklist/MONT-DC-003_WinServerDNS_V2R3_20251023-172313.ckl
Unassigned 2026-01-14T12:57:38.179760 View in Context
CUI