Checked | Name | Title |
---|
☐ | SV-101909r1_rule | The MobileIron Core v10 server must be able to limit user enrollment of devices that do not have required OS type and version. |
☐ | SV-101911r1_rule | The MobileIron Core v10 server or platform must be configured to initiate a session lock after a 15-minute period of inactivity. |
☐ | SV-101913r1_rule | The MobileIron Core v10 server must be configured to transfer MobileIron Core v10 server logs to another server for storage, analysis, and reporting. Note: MobileIron Core v10 server logs include logs of MDM events and logs transferred to the MobileIron Core v10 server by MDM agents of managed devices. |
☐ | SV-101915r1_rule | The MobileIron Core v10 server must be configured to display the required DoD warning banner upon administrator logon. Note: This requirement is not applicable if the TOE platform is selected in FTA_TAB.1.1 in the Security Target (ST). |
☐ | SV-101917r1_rule | The MobileIron Core v10 server must be configured with a periodicity for reachable events of six hours or less for the following commands to the agent: - query connectivity status; - query the current version of the MD firmware/software; - query the current version of the hardware model of the device; - query the current version of installed mobile applications; - read audit logs kept by the MD. |
☐ | SV-101919r1_rule | The MobileIron Core v10 server must be configured to have at least one user in the following Administrator roles: Server primary administrator, security configuration administrator, device user group administrator, auditor. |
☐ | SV-101921r1_rule | The MobileIron Core v10 server must be configured to implement FIPS 140-2 mode for all server encryption (if not automatically configured during server install). |
☐ | SV-101923r1_rule | Authentication of MDM platform accounts must be configured so they are implemented via an enterprise directory service. |
☐ | SV-101925r1_rule | The MDM server platform must be protected by a DoD-approved firewall. |
☐ | SV-101927r1_rule | The firewall protecting the MDM server platform must be configured to restrict all network traffic to and from all addresses with the exception of ports, protocols, and IP address ranges required to support MDM server and platform functions. |
☐ | SV-101929r1_rule | The firewall protecting the MDM server platform must be configured so that only DoD-approved ports, protocols, and services are enabled. (See the DoD Ports, Protocols, Services Management [PPSM] Category Assurance Levels [CAL] list for DoD-approved ports, protocols, and services.) |