Creating an Advanced Security Site

When you run the Site creation wizard, you have the option to create a Site with advanced security options enabled and that can monitor, report, and/or warn when those settings are changed and can cause compliance violations.

Prerequisites:

Constraints:

For details of configuring Servers and Sites, and enabling ARM on EFT, refer to the following topics:

You will need the following information to create and configure a high security-enabled Site:

The wizard performs several checks and asks you to provide information or make changes based on the results of those checks, including:

The wizard is quite intuitive and provides instructions where necessary. The wizard pages change based on your selections. The procedure below walks you through the most common scenarios.

To configure an advanced security-enabled Site

  1. Do one of the following:

    The Site Setup wizard Site Security Policy page appears.

  2. Click Strict security settings, and then click Next. The Site Label and Listening IP page appears.

  3. In the Site label box, type a name a unique name for the Site. The default name is MySite, but you can change it to anything you want. The name you provide here will appear in the EFT tree in the left pane of the administration interface and in reports and messages.

  4. Next to the Listening IPs box, click Configure. The Listening IP Settings dialog box appears.

  5. Select one of the All Incoming check boxes, or one or more specific IP addresses on which this Site should listen for incoming connections, and then click OK.

  6. Click Next. The Site Root Folder page appears.

  7. In the Site root box, leave the default or click Browse to specify the root folder.

  8. In the Additional site root folder options area, select or clear the check boxes as needed:

  9. Click Next. The User Authentication page appears.

  10. In the Authentication type list, specify one of the following authentication methods that this Site will use to authenticate user connections:

    When you create a high security-enabled Site that uses AD or LDAP authentication, the following states will not be audited for user accounts but will be audited for non-AD administrator accounts:

    • Password complexity and length requirements

    • Password history requirements

    • Password reset requirements

    • Password expiration requirements

    • Password anonymous requirements

    • Password e-mailing to user requirements

    The same PCI DSS requirement checks are skipped when RADIUS or RSA SecurID is used, and compensating controls are shown in their place.

  11. Under Advanced Authentication Options, specify whether this Site will use RADIUS, RSA SecurID, or the default of None. (Common Access Card (CAC) authentication is not allowed for high security-enabled Sites.)

  12. Click Next. The Perimeter Network Security page appears.

  13. If you are using the DMZ Gateway module, provide the IP address and port to connect the Site to DMZ Gateway, then click Test Connection to verify that the Site can connect to DMZ Gateway. If the Site is unable to connect, you can continue without enabling DMZ Gateway and enable it later.

  14. Click Next. If you specified a default port for DMZ Gateway, the Vendor Defaults page appears.

  15. Change the port number to a non-default number, or provide a reason for keeping the default port. (The reason will appear in the Description box of the PCI DSS Compliance report.)

  16. Click Next. If EFT was configured with the default Administrator port of 1100, the Vendor Defaults page appears for you to change the Administrator port or provide justification for using the default.

  17. Click Next. The Data Retention and Disposal page appears.

  18. Do one of the following:

  19. Click Next. The Administrator Account Password Security page appears.

  20. Keep the default of Enable options identified above for all administrator accounts (password security settings) or click Continue without changing administrator account password security settings, then provide the justification and compensating control. (The reason will appear in the Description box of the PCI DSS Compliance report.) You can specify these password security settings individually after you create the Site.

  21. Click Next. The Daily PCI DSS Audit Report page appears.

  22. Do one of the following:

  23. Click Next. The Data Sanitization page appears.

  24. Do one of the following:

  25. Click Next. The Connection Protocols page appears.

  26. Select one or more protocol check boxes and specify the port numbers that this Site will use to connect to EFT.

    If you specify plain text FTP or HTTP, after you click Next, EFT will prompt you to disable these insecure protocols or continue and supply justification.

  27. Click Next. If the default SFTP banner message is used on EFT, the Vendor Default warning page appears. Do one of the following:

  28. Click Next. The Site Setup Completed page appears.

  29. You are offered the option of continuing to the User Creation wizard or quitting the wizard. Click an option, and then click Finish. The high security-enabled Site appears in the tree on the Server tab.