UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The UEM server must notify system administrators and the Information System Security Officer (ISSO) for account removal actions.


Overview

Finding ID Version Rule ID IA Controls Severity
V-234441 SRG-APP-000294-UEM-000168 SV-234441r879672_rule Medium
Description
When application accounts are removed, user accessibility is affected. Accounts are utilized for identifying users or for identifying the application processes themselves. Sending notification of account removal events to the system administrator and ISSO is one method for mitigating this risk. Such a capability greatly reduces the risk that application accessibility will be negatively affected for extended periods of time and also provides logging that can be used for forensic purposes. To address access requirements, many operating systems can be integrated with enterprise-level authentication/access/auditing mechanisms that meet or exceed access control policy requirements. Satisfies:FAU_ALT_EXT.1.1, FAU_GEN.1.1(1), FMT_SMF.1.1(2)c.8 Reference:PP-MDM-411065, PP-MDM-412000
STIG Date
Unified Endpoint Management Server Security Requirements Guide 2023-02-13

Details

Check Text ( C-37626r617414_chk )
Requirement is Not Applicable when UEM server is configured to use DoD Central Directory Service for administrator account authentication.

Verify the UEM server notifies system administrators and the ISSO for account removal actions.

If the UEM server does not notify system administrators and the ISSO for account removal actions, this is a finding.
Fix Text (F-37591r614334_fix)
Configure the UEM server to notify system administrators and the ISSO for account removal actions.