UCF STIG Viewer Logo

Intrusion detection software must be able to interconnect using standard protocols to create a system wide intrusion detection system.


Overview

Finding ID Version Rule ID IA Controls Severity
V-36295 SRG-APP-281-NA SV-47699r1_rule Medium
Description
When utilizing intrusion detection software, monitoring components are usually dispersed throughout the network, such as, when utilizing HIDS and multiple NIDS sensors. In order to leverage the capabilities of intrusion detection systems to get a complete overall view of network and host activity, these separate components must be able to report and react to activity they detect. Rationale for non-applicability: The MDM server is not an IDS.
STIG Date
Mobile Device Manager Security Requirements Guide 2013-01-24

Details

Check Text ( C-44536r1_chk )
This requirement is NA for the MDM server SRG.
Fix Text (F-40826r1_fix)
The requirement is NA. No fix is required.