UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

BES IT Policy rule is configured as required. IT Policy rule “Desktop Allow Device Switch” (Desktop policy group) is set as required.


Overview

Finding ID Version Rule ID IA Controls Severity
V-19747 WIR1450-28 SV-21893r2_rule ECSC-1 Medium
Description
Stops a user from changing Blackberry devices without the approval of the Blackberry Administrator. BlackBerry security software (S/MIME, etc.) may not be installed correctly and other required provisioning steps may not be completed. Blackberry device and system could be vulnerable to attack by hackers or malware.
STIG Date
BlackBerry Enterprise Server, Part 3 Security Technical Implementation Guide 2011-04-11

Details

Check Text ( C-24193r2_chk )
Detailed Policy Requirements:

Configuration management of the Blackberry device software will be maintained. Only authorized software will be installed from a trusted source. Provisioning of the handheld will be completed under the control of the BlackBerry system administrator.

*****For this check, set IT Policy rule “Desktop Allow Device Switch” (Desktop policy group) to “No" or "FALSE.”

Check Procedures:

This is a BES IT Policy check. Recommend that all checks related to BES IT policies be reviewed
using the procedure in Check WIR1400-01 (V0003545).

*****.Verify IT Policy rule “Desktop Allow Device Switch” (Desktop policy group) is set as required.

Fix Text (F-23386r1_fix)
Configure the IT Policy rule as specified in the "Checks" block.