UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The MDM Agent must be configured to enable the following function: [selection: read audit logs of the MD]. This requirement is inherently met if the function is automatically implemented during MDM Agent install/device enrollment.


Overview

Finding ID Version Rule ID IA Controls Severity
V-221651 VMW1-00-400040 SV-221651r588007_rule Medium
Description
Audit logs and alerts enable monitoring of security-relevant events and subsequent forensics when breaches occur. They help identify when the security posture of the device is not as expected. This enables the MDM administrator to take an appropriate remedial action. SFR ID: FMT_SMF_EXT.4.1
STIG Date
VMware Workspace ONE UEM Security Technical Implementation Guide 2021-11-04

Details

Check Text ( C-23366r416791_chk )
Review the MDM Agent documentation and configuration settings to determine if the following function is enabled: read audit logs of the MD.

This validation procedure is performed on the MDM Administration Console.

On the MDM console, do the following:
1. Authenticate to the Workspace ONE UEM console as the administrator.
2. Navigate to Groups & Settings >> All Settings >> Devices & Users >> General >> Privacy and enable Request Device Log in the privacy settings.

If "Request Device Log" is present, then no device log is being requested from the MD and this is a finding.
Fix Text (F-23355r416792_fix)
Configure the MDM Agent to enable the following function: read audit logs of the MD.

On the MDM console, do the following:
1. Authenticate to the Workspace ONE UEM console as the administrator.
2. Navigate to Groups & Settings >> All Settings >> Devices & Users >> General >> Privacy and enable Request Device Log in the privacy settings.
3. Select "SAVE".