UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The MDM server must monitor for unauthorized connections of mobile devices to the MDM server application.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36021 SRG-APP-021-MDM-018-SRV SV-47410r1_rule Medium
Description
Mobile devices include portable storage media (e.g., USB memory sticks, external hard disk drives) and portable computing and communications devices with information storage capability (e.g., notebook/laptop computers, personal digital assistants, cellular telephones, digital cameras, audio recording devices). Unapproved or unrecognized devices connected to the network and being served by an MDM server as well can lead to malware possibly gaining control over the MDM server.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44260r1_chk )
Review the MDM server configuration to determine whether the system is monitoring for unauthorized connections of mobile devices to the MDM server application. If the MDM server is not performing this monitoring function, this is a finding.
Fix Text (F-40551r1_fix)
Configure the MDM server to monitor for unauthorized connections of mobile devices to the MDM server application.