UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The MDM server must employ automated mechanisms to respond to unauthorized changes to the security policy or MDM server agent on managed mobile devices.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36153 SRG-APP-138-MDM-152-MDM SV-47557r1_rule Medium
Description
Uncoordinated or incorrect configuration changes to the MDM server managed components can potentially lead to compromises. Without automated mechanisms to respond to changes, changes can go unnoticed for a significant amount of time which could result in compromise.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44393r1_chk )
Review the MDM server configuration to ensure the MDM server can employ automated mechanisms to respond to unauthorized changes to the security policy or MDM server agent on managed mobile devices. If this function is not present, this is a finding.
Fix Text (F-40683r1_fix)
Configure the MDM server to automatically respond to unauthorized changes to the security policy or MDM server agent on managed mobile devices.