UCF STIG Viewer Logo

Microsoft Android 11 must be configured to enforce an application installation policy by specifying one or more authorized application repositories, including [selection: DOD-approved commercial app repository, EMM server, mobile application store].


Overview

Finding ID Version Rule ID IA Controls Severity
V-255206 MSFT-11-000800 SV-255206r870819_rule Medium
Description
Forcing all applications to be installed from authorized application repositories can prevent unauthorized and malicious applications from being installed and executed on mobile devices. Allowing such installations and executions could cause a compromise of DOD data accessible by these unauthorized/malicious applications. SFR ID: FMT_SMF_EXT.1.1 #8a
STIG Date
Microsoft Android 11 COPE Security Technical Implementation Guide 2022-11-14

Details

Check Text ( C-58819r870806_chk )
Review Microsoft Android device configuration settings to determine if the mobile device has only approved application repositories (DOD-approved commercial app repository, EMM server, and/or mobile application store).

This validation procedure is performed on both the EMM Administration console and the Android 11 device.

On the EMM console:
1. Open "Set user restrictions".
2. Verify that "Disallow install unknown sources" is toggled to "on".
3. Verify that "Disallow installs from unknown sources globally" is toggled to "on".

On the Microsoft Android 11 device:
1. Open Settings >> Apps and notifications >> Advanced >> Special app access.
2. Open Install unknown apps.
3. Ensure the list of apps is blank or if an app is on the list, "Disabled by admin" is listed under the app name.

If the EMM console device policy is not set to allow connections to only approved application repositories or on the Android 11 device, the device policy is not set to allow connections to only approved application repositories, this is a finding.
Fix Text (F-58763r870723_fix)
Configure the Microsoft Android 11 device to disable unauthorized application repositories.

On the EMM console:
1. Open "Set user restrictions".
2. Toggle "Disallow install unknown sources" to "on".
3. Toggle "Disallow installs from unknown sources globally" to "on".