Ivanti Sentry 9.x NDM Security Technical Implementation Guide
Pick two releases to diff their requirements.
Open a previous version of this STIG.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- MOIS-ND-000020
- Vuln IDs
-
- V-250982
- Rule IDs
-
- SV-250982r1028209_rule
Checks: C-54417r802166_chk
Verify that the CLISH has a max number of SSH sessions enabled. 1. Log in to the Sentry System Manager. 2. Go to Settings >> CLI. 3. Verify a Max SSH Sessions integer (1-10) is set based on security guidance. If the Max SSH Sessions integer is not set correctly, this is a finding.
Fix: F-54371r802167_fix
Configure the CLISH with a max number of SSH sessions. 1. Log in to the Sentry System Manager. 2. Go to Settings >> CLI. 3. Configure a Max SSH Sessions integer (1-10) based on security guidance. 4. Click "Apply" and "Save" in the top right corner.
- RMF Control
- AC-10
- Severity
- M
- CCI
- CCI-000054
- Version
- MOIS-ND-000030
- Vuln IDs
-
- V-250983
- Rule IDs
-
- SV-250983r1028210_rule
Checks: C-54418r802169_chk
Verify that a secondary interface has been added for System Manager Portal Access of Sentry. 1. Log in to the Sentry System Manager. 2. Go to Settings >> Network >> Interfaces. 3. Verify a Management Interface for internal access of the System Manager Portal has been added as one of the interfaces. If the Management Interface for internal access of the System Manager Portal has not been added as one of the Interfaces, this is a finding.
Fix: F-54372r802170_fix
Configure a secondary interface for System Manager Portal Access of Sentry. 1. Log in to the Sentry System Manager. 2. Go to Settings >> Network >> Interfaces. 3. Click an open Physical Interface such as GigabitEthernet2. 4. Configure a Management Interface for internal access of the System Manager Portal (refer to the "MobileIron Standalone Sentry 9.8.0 Installation Guide" Physical Interfaces section for more information).
- RMF Control
- AC-11
- Severity
- M
- CCI
- CCI-000057
- Version
- MOIS-ND-000050
- Vuln IDs
-
- V-250984
- Rule IDs
-
- SV-250984r1028211_rule
Checks: C-54419r1004827_chk
Verify the System manager Timeout is set to 15 minutes. 1. Log in to the Sentry System Manager. 2. Navigate to Settings >> Timeout. 3. Verify the System Manager timeout is set to 15. If the System Manager timeout is not set to 15, this is a finding.
Fix: F-54373r1004828_fix
Set the System Manager Timeout to 15 minutes. 1. Log in to the Sentry System Manager. 2. Navigate to Settings >> Timeout. 3. Configure the System Manager timeout to 15. 4. Click "Apply" and "Save" in the top right corner.
- RMF Control
- AC-4
- Severity
- L
- CCI
- CCI-001368
- Version
- MOIS-ND-000130
- Vuln IDs
-
- V-250985
- Rule IDs
-
- SV-250985r1028212_rule
Checks: C-54420r1004830_chk
Review Sentry configuration to determine if it enforces approved authorizations for controlling the flow of management information within the network. Sentry receives a request from MobileIron Core and enforces verification before handling the request to validate that it is from a trusted MobileIron Core. Therefore, if the deployment uses MobileIron Core, to verify that Sentry trusts MobileIron Core in the deployment: 1. Run the following command in Sentry CLI: show sentry EMM-source-verify If this is set to "false", this is a finding. 2. Run the following command in Sentry CLI: show sentry emm-ips If the Core IP is not specified, this is a finding. 3. Verify Sentry has an ACL for Core in Sentry System Manager. Then: 1. In the Standalone Sentry System Manager, go to Security >> Access Control Lists. 2. Verify that an ACL is created for Core. If it is not, this is a finding. 3. Determine if Sentry is configured with specified backend services such as Exchange Active Sync or App Tunnels. If the backend service is not specified, this is a finding. Refer to section "Configuring Standalone Sentry for ActiveSync" and "Configuring Standalone Sentry for AppTunnel" in "Sentry 9.8 Guide for MobileIron Core" to ensure these services are configured in Sentry settings in Core where applicable.
Fix: F-54374r1004831_fix
Configure Sentry to enforce approved authorizations for controlling the flow of management information within the network device. Sentry receives a request from MobileIron Core and enforces verification before handling the request to validate that it is from a trusted MobileIron Core. Therefore, if the deployment uses MobileIron Core, to ensure that Sentry trusts MobileIron Core in the deployment, run the following commands in Sentry CLI: 1. sentry emm-source-verify true 2. sentry emm-ips <subnet_list>> 3. This can further be mitigated by creating ACLs for Sentry System Manager. Then: 1. In the Standalone Sentry System Manager, go to Security >> Access Control Lists. 2. Click "Add". 3. In the "Name" field, enter a name to identify the ACL. 4. In the "Description" field, enter text to clarify the purpose of the ACL. 5. Click "Save". 6. Select the new ACL that was created and click it, which should open a Modify ACL dialog box. 7. Click "Add" to add an access control entry (ACE) to the ACL. Each ACE consists of a combination of the network hosts and services that were configured for use in ACLs. 8. Use the following guidelines to complete the form: Source Network Destination Network Service Action - Select Permit or Deny from the dropdown list. Connections Per Minute 9. Click "Save". 10. Configure Sentry with specified backend services such as Exchange Active Sync or App Tunnels. Refer to section "Configuring Standalone Sentry for ActiveSync" and "Configuring Standalone Sentry for AppTunnel" in "Sentry 9.8 Guide for MobileIron Core" to ensure these services are configured in Sentry settings in Core where applicable.
- RMF Control
- AC-7
- Severity
- L
- CCI
- CCI-000044
- Version
- MOIS-ND-000140
- Vuln IDs
-
- V-250986
- Rule IDs
-
- SV-250986r1028213_rule
Checks: C-54421r1004833_chk
Review Sentry configuration to verify that it enforces the limit of three consecutive invalid logon attempts. 1. Log in to Sentry System Manager portal. 2. Go to the "Security" tab. 3. Go to "Password Policy". 4. Look for "Number of Failed Attempts" and determine if the value is set to 3. If it is not, this is a finding. 5. Verify the Auto-Lock Time value is set to 900 seconds or more. If the Auto-Lock Time is not set to 900 seconds or more, this is a finding.
Fix: F-54375r1004834_fix
Configure Sentry to enforce the limit of three consecutive invalid login attempts during a 15-minute time period. 1. Log in to Sentry System Manager portal. 2. Go to the "Security" tab. 3. Go to "Password Policy". 4. For "Number of Failed Attempts", set value to 3. 5. For "Auto-Lock Time", set value to 900 seconds or more.
- RMF Control
- AC-8
- Severity
- M
- CCI
- CCI-000048
- Version
- MOIS-ND-000150
- Vuln IDs
-
- V-250987
- Rule IDs
-
- SV-250987r1028214_rule
Checks: C-54422r1004836_chk
Verify that Sentry displays "I've read and consent to terms in IS user agreem't" when logging in to the command line. 1. Log in to the Sentry System Manager or the CLI interface. 2. Verify the required login banner is displayed. If the banner is not shown, this is a finding.
Fix: F-54376r1004837_fix
Configure Sentry to display "I've read and consent to terms in IS user agreem't" when logging in to the command line. 1. Log in to the Sentry System Manager. 2. Go to Settings >> Login. 3. Add the required login banner to the "Text to Display" box. 4. Click "Apply".
- RMF Control
- IA-2
- Severity
- H
- CCI
- CCI-000765
- Version
- MOIS-ND-000390
- Vuln IDs
-
- V-250988
- Rule IDs
-
- SV-250988r1028216_rule
Checks: C-54423r1004839_chk
Review the Sentry Configuration to ensure Certificate Authentication has been configured. 1. Log in to the Sentry System Manager. 2. Go to Security tab >> Advanced >> Sign-in Authentication. 3. Determine if Certificate Authentication is activated and configured. If Certificate Authentication is not activated and configured, this is a finding.
Fix: F-54377r1028215_fix
Configure the Sentry with DOD PKI-based Certificate Authentication. 1. Log in to the Sentry System Manager. 2. Go to Security tab >> Advanced >> Sign-in Authentication. 3. Select the Certificate Authentication checkbox. 4. Select the CAC or PIV checkbox. 5. Map user certificate fields in the Certificate Attribute Mapping section based on the organization's certificates. 6. Upload the Issuing CA Certificate chain. 7. Click "Apply" and "Save" in the top right corner. 8. If using DOD PKI, ensure an EDIPI attribute is assigned to the user in the Security >> Local Users section.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- MOIS-ND-000420
- Vuln IDs
-
- V-250989
- Rule IDs
-
- SV-250989r1029559_rule
Checks: C-54424r1004842_chk
Review Sentry configuration to verify that a minimum 15-character password is set. 1. Log in to Sentry System Manager portal. 2. Go to the "Security" tab. 3. Go to Identity Source >> Password Policy. 4. Verify the "Minimum Password Length" is set to 15 or more. If the password character length is not set 15 or more, this is a finding.
Fix: F-54378r1004843_fix
Configure the Sentry Local User Password Policy to enforce a minimum 15-character password. 1. Log in to Sentry System Manager portal. 2. Go to the "Security" tab. 3. Go to Password Policy. 4. Set the "Minimum Password Length" value to 15 or more.
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- MOIS-ND-000430
- Vuln IDs
-
- V-250990
- Rule IDs
-
- SV-250990r1029560_rule
Checks: C-54425r1028218_chk
Where passwords are used, verify that Sentry Server enforces password complexity by requiring that at least one uppercase character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If Sentry Server does not require that at least one uppercase character be used in each password, this is a finding. Verify the local Password Policy enforces an uppercase value: 1. Log in to the System Manager of Sentry. 2. Go to Security >> Identity Source >> Password. 3. Verify "Upper Case" is checked. If "Upper Case" is not checked, this is a finding.
Fix: F-54379r1028219_fix
Configure Sentry Server to enforce password complexity by requiring that at least one uppercase character be used. 1. Log in to the System Manager of Sentry. 2. Go to Security >> Password. 3. Check "Upper Case". 4. Select "Apply".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- MOIS-ND-000440
- Vuln IDs
-
- V-250991
- Rule IDs
-
- SV-250991r1029561_rule
Checks: C-54426r1028221_chk
Where passwords are used, confirm that Sentry Server enforces password complexity by requiring that at least one lowercase character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If Sentry does not require that at least one lowercase character be used in each password, this is a finding. 1. Log in to the System Manager of Sentry. 2. Go to Security >> Identity Source >> Password. 3. Verify "Lower Case" is checked. If "Lower Case" is not checked, this is a finding.
Fix: F-54380r1028222_fix
Configure Sentry Server to enforce password complexity by requiring that at least one lowercase character be used. 1. Log in to the System Manager of Sentry. 2. Go to Security >> Password. 3. Check "Lower Case". 4. Select "Apply".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- MOIS-ND-000450
- Vuln IDs
-
- V-250992
- Rule IDs
-
- SV-250992r1029562_rule
Checks: C-54427r1028224_chk
Where passwords are used, confirm that Sentry Server enforces password complexity by requiring that at least one numeric character be used. This requirement may be verified by demonstration, configuration review, or validated test results. If Sentry Server does not require that at least one numeric character be used in each password, this is a finding. 1. Log into the System Manager of Sentry. 2. Go to Security >> Identity Source >> Password. 3. Verify "Numeric" is checked. If "Numeric" is not checked, this is a finding.
Fix: F-54381r1028225_fix
Configure Sentry Server to enforce password complexity by requiring that at least one numeric character be used. 1. Log in to the System Manager of Sentry. 2. Go to Security >> Password. 3. Check "Numeric". 4. Select "Apply".
- RMF Control
- Severity
- M
- CCI
- CCI-004066
- Version
- MOIS-ND-000460
- Vuln IDs
-
- V-250993
- Rule IDs
-
- SV-250993r1029563_rule
Checks: C-54428r1028227_chk
Where passwords are used, confirm that Sentry Server enforces password complexity by requiring that at least one special character be used. If Sentry Server does not require that at least one special character be used in each password, this is a finding. 1. Log in to the System Manager of Sentry. 2. Go to Security >> Identity Source >> Password. 3. Verify "Special Character" is checked. If "Special Character" is not checked, this is a finding.
Fix: F-54382r1028228_fix
Configure Sentry Server to enforce password complexity by requiring that at least one special character be used. 1. Log in to the System Manager of Sentry. 2. Go to Security >> Password. 3. Check "Special Character". 4. Select "Apply".
- RMF Control
- AU-10
- Severity
- H
- CCI
- CCI-000166
- Version
- MOIS-ND-000510
- Vuln IDs
-
- V-250994
- Rule IDs
-
- SV-250994r1028230_rule
Checks: C-54429r802202_chk
Verify that an EDIPI is mapped to the Sentry Admin user accounts. 1. Log in to the Sentry System Manager. 2. Verify "Certificate Based Authentication" under Security Tab >> Sign-In Authentication. 3. Verify that a Certificate Attribute Mapping is mapped to EDIPI. 4. Go to Security tab >> Local Users. Click on an active Local User and configure an EDIPI. 5. Click "Apply". 6. Repeat step 4 for all local users. If EDIPI is not mapped to the Sentry Admin user accounts, this is a finding.
Fix: F-54383r802203_fix
Ensure that an EDIPI is mapped to the Sentry Admin user accounts. 1. Log in to the Sentry System Manager. 2. Ensure "Certificate Based Authentication" under Security Tab >> Sign-In Authentication. 3. Ensure that a Certificate Attribute Mapping is mapped to EDIPI. 4. Go to Security tab >> Local Users. Click on an active Local User and configure an EDIPI. 5. Click "Apply". 6. Repeat step for 4 for all local users.
- RMF Control
- IA-7
- Severity
- H
- CCI
- CCI-000803
- Version
- MOIS-ND-000530
- Vuln IDs
-
- V-250995
- Rule IDs
-
- SV-250995r1028232_rule
Checks: C-54430r1004858_chk
Verify the Sentry uses encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions. On the Sentry CLI console, do the following: 1. SSH to Sentry Server from any SSH client. 2. Enter the administrator credentials set at Sentry installation. 3. Enter "enable". 4. When prompted, enter the "enable secret" set at Sentry installation. 5. Enter "show FIPS". 6. Verify "FIPS 140 mode is enabled" is displayed. If the Sentry Server does not report that FIPS mode is "enabled", this is a finding.
Fix: F-54384r1028231_fix
Configure the Sentry Server to use a FIPS 140-2-validated cryptographic module. On the Sentry console, do the following: 1. SSH to Sentry Server from any SSH client. 2. Enter the administrator credentials set at Sentry installation. 3. Enter "enable". 4. When prompted, enter the "enable secret" set at Sentry installation. 5. Enter "configure terminal". 6. Enter the following command to enable FIPS: FIPS 7. Enter the following command to proceed with the necessary reload: do reload 8. Enter "Yes" at saved configuration modified prompt. 9. Enter "Yes" at proceed do reload.
- RMF Control
- SC-10
- Severity
- H
- CCI
- CCI-001133
- Version
- MOIS-ND-000550
- Vuln IDs
-
- V-250996
- Rule IDs
-
- SV-250996r1028233_rule
Checks: C-54431r1004861_chk
The Sentry System Manager has two interfaces, a CLI restricted shell and web-based GUI. In the Sentry MICS portal, verify that the Sentry CLI timeout is set to 10 minutes. 1. Log in to Sentry. 2. Go to Settings >> CLI. 3. Within CLI Configuration, verify the CLI Session Timeout(minutes) is set to greater than 10 minutes. If the CLI Session Timeout(minutes) is not set to greater than 10 minutes, this is a finding.
Fix: F-54385r1004862_fix
Configure the Sentry to terminate the connection associated with a device management session at the end of the session or after 10 minutes of inactivity. 1. Log in to Sentry. 2. Go to Settings >> CLI. 3. Within CLI Configuration, input "10" for CLI Session Timeout(minutes). 4. Click "Apply".
- RMF Control
- SC-23
- Severity
- M
- CCI
- CCI-001188
- Version
- MOIS-ND-000580
- Vuln IDs
-
- V-250997
- Rule IDs
-
- SV-250997r1028235_rule
Checks: C-54432r1004864_chk
Verify the Sentry uses encryption services that implement NIST FIPS-validated cryptography to protect the confidentiality of remote access sessions. On the Sentry CLI console, do the following: 1. SSH to Sentry Server from any SSH client. 2. Enter the administrator credentials set at Sentry installation. 3. Enter "enable". 4. When prompted, enter the "enable secret" set at Sentry installation. 5. Enter "show FIPS". 6. Verify "FIPS 140 mode is enabled" is displayed. If the Sentry Server does not report that FIPS mode is "enabled", this is a finding.
Fix: F-54386r1028234_fix
Configure the Sentry Server to use a FIPS 140-2-validated cryptographic module. On the Sentry console, do the following: 1. SSH to Sentry Server from any SSH client. 2. Enter the administrator credentials set at Sentry installation. 3. Enter "enable". 4. When prompted, enter the "enable secret" set at Sentry installation. 5. Enter "configure terminal". 6. Enter the following command to enable FIPS: FIPS 7. Enter the following command to proceed with the necessary reload: do reload 8. Enter "Yes" at saved configuration modified prompt. 9. Enter "Yes" at proceed do reload.
- RMF Control
- AU-5
- Severity
- L
- CCI
- CCI-001858
- Version
- MOIS-ND-000690
- Vuln IDs
-
- V-250998
- Rule IDs
-
- SV-250998r1028236_rule
Checks: C-54433r1004867_chk
Verify the Sentry is configured to send alerts for failure events in Sentry System Manager web GUI. 1. Log in to Sentry. 2. Go to Monitoring >> Alert Configuration. 3. Verify Alert monitoring is configured. If Alert Configuration settings are not configured, this is a finding. Refer to the "Alert Configuration" section of the "Sentry 9.8.0 Guide for MobileIron Core" for more information.
Fix: F-54387r1004868_fix
Configure the Sentry to send alerts for failure events in Sentry System Manager web GUI. 1. Log in to Sentry. 2. Go to Monitoring >> Alert Configuration. 3. Check "Send Notification". 4. Apply Email List. 5. Enter Alerts Per Hour. 6. Enter Batch Time Interval (min). 7. Select "Default Alert Action". 8. Apply. 9. Add Alert Notification Management. 10. Add Alert ID. 11. Add "Action" from dropdown. 12. Click "Apply" and "Save" in the top right corner. Refer to the "Alert Configuration" section of the "Sentry 9.8.0 Guide for MobileIron Core" for more information.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- MOIS-ND-000700
- Vuln IDs
-
- V-250999
- Rule IDs
-
- SV-250999r1029564_rule
Checks: C-54434r1004870_chk
Verify the Sentry is configured with multiple date and time servers (NTP). 1. Log in to Sentry. 2. Go to Settings >> Date and Time (NTP). 3. Verify the NTP servers are configured. If NTP servers are not configured, this is a finding. Refer to the "Date and Time (NTP)" section of the "Sentry 9.8.0 Guide for MobileIron Core" for more information.
Fix: F-54388r1004871_fix
Configure the Sentry with multiple date and time servers (NTP). 1. Log in to Sentry. 2. Go to Settings >> Date and Time (NTP). 3. Under Time Source dropdown, select "NTP". 4. Enter at least Primary and Secondary NTP servers. 5. Click "Apply" and "Save" in the top right corner. Refer to the "Date and Time (NTP)" section of the "Sentry 9.8.0 Guide for MobileIron Core" for more information.
- RMF Control
- IA-3
- Severity
- M
- CCI
- CCI-001967
- Version
- MOIS-ND-000760
- Vuln IDs
-
- V-251000
- Rule IDs
-
- SV-251000r1028238_rule
Checks: C-54435r1004873_chk
On the Sentry console, do the following to verify FIPS mode is enabled: 1. SSH to Sentry Server from any SSH client. 2. Enter the administrator credentials set at Sentry installation. 3. Enter "enable". 4. When prompted, enter the "enable secret" set at Sentry installation. 5. Enter "show FIPS". 6. Verify "FIPS 140 mode is enabled" is displayed. If it is not, this is a finding. Then: 1. Log in to Sentry. 2. Go to Settings >> SNMP. 3. Verify SNMP server has been added. a. If SNMP server is not added, this is a finding. b. If SNMP server is added, go to step 4. 4. Verify SNMP Control is not disabled. a. If SNMP Control is disabled, this is a finding. b. If SNMP Control is not disabled, go to step 5. 5. Verify Protocol v3 is selected. a. If Protocol v3 is not selected, this is a finding. b. If Protocol v3 is selected, go to step 6. 6. Verify the SNMP v3 User has been added. a. If SNMP v3 User has not been added, this is a finding.
Fix: F-54389r1004874_fix
On Sentry console, do the following to configure FIPS mode: 1. SSH to the Sentry. 2. At the prompt, enter "enable" mode with the secret credentials. 3. Type Configure command. 4. Type FIPS. 5. Once reloaded, SSH to the Sentry. 6. Run the "show FIPS". Then: 1. Log in to Sentry. 2. Go to Settings >> SNMP. 3. Add SNMP Trap Receiver. 4. Enable SNMP Service. 5. Select Protocol v3. 6. Add SNMP v3 Users. 7. Enter User Name. 8. Select Security Level from dropdown. 9. Select AUTH Protocol from dropdown. 10. Enter AUTH Password. 11. Select Privacy Protocol from dropdown. 12. Enter Privacy Password. 13. Click "Save". 14. Enable Link Up/Down Trap. 15. Click "Apply" to save changes.
- RMF Control
- MA-4
- Severity
- H
- CCI
- CCI-003123
- Version
- MOIS-ND-000810
- Vuln IDs
-
- V-251001
- Rule IDs
-
- SV-251001r1028239_rule
Checks: C-54436r1004876_chk
On Sentry console, do the following to verify FIPS mode is activated to protect the confidentiality of remote maintenance sessions: 1. SSH to the Sentry. 2. Run the "show FIPS" command. 3. Verify FIPS 140 mode is not disabled. If FIPS 140-2 mode is disabled, this is a finding.
Fix: F-54390r1004877_fix
Configure Sentry to use FIPS 140-2 approved algorithms to protect the confidentiality of remote maintenance sessions: 1. SSH to the Sentry. 2. At the prompt, enter "enable" mode with the secret credentials. 3. Type Configure command. 4. Type FIPS. 5. Once reloaded, SSH to the Sentry. 6. Run the "show FIPS" command. FIPS 140 mode is enabled.
- RMF Control
- AU-4
- Severity
- L
- CCI
- CCI-001851
- Version
- MOIS-ND-000900
- Vuln IDs
-
- V-251002
- Rule IDs
-
- SV-251002r1028240_rule
Checks: C-54437r1004879_chk
Verify Sentry is configured to offload audit records to a different system. 1. Log in to Sentry. 2. Go to Settings >> Syslog. 3. Verify that a syslog server is configured. If the syslog server is not configured, this is a finding.
Fix: F-54391r1004880_fix
Configure Sentry to forward/offload audit to a different system. 1. Log in to Sentry. 2. Go to Settings >> Syslog. 3. Configure a new syslog server if not already added. 4. Click on the syslog server(s) and in the "Modify Syslog"/"Add Syslog" pop-up dialog, under the "Facility Type", click the checkbox for "Audit". 5. Set the Admin State to "Enable". 6. Click "Apply".
- RMF Control
- CM-5
- Severity
- L
- CCI
- CCI-000345
- Version
- MOIS-ND-000930
- Vuln IDs
-
- V-251003
- Rule IDs
-
- SV-251003r1028241_rule
Checks: C-54438r1004882_chk
Verify that only authorized administrators have permissions for changes, deletions, and updates on the Sentry. 1. Log in to System Manager. 2. Go to Security >> Local Users. 3. Verify no unauthorized users are listed. If unauthorized users are listed, this is a finding.
Fix: F-54392r1004883_fix
Configure that only authorized administrators have permissions for changes, deletions, and updates on the Sentry. 1. Log in to System Manager. 2. Go to Security >> identity Source >> Local Users. 3. Click "Add" to add authorized users. 4. If unauthorized users are listed, click the check box next to the unauthorized user and click "Delete".
- RMF Control
- CM-6
- Severity
- L
- CCI
- CCI-000366
- Version
- MOIS-ND-000950
- Vuln IDs
-
- V-251004
- Rule IDs
-
- SV-251004r1028242_rule
Checks: C-54439r1004885_chk
Identify/validate Sentry support for periodic backups. This is done via the virtual machine. Check with the virtual team to verify backups are scheduled. If the backups are not scheduled, this is a finding.
Fix: F-54393r1004886_fix
Ensure the virtual solution provides periodic backups. Refer to "Sentry Installation Guide", section "Periodic backups for VMware", pages 6-7.
- RMF Control
- CM-6
- Severity
- M
- CCI
- CCI-000366
- Version
- MOIS-ND-000970
- Vuln IDs
-
- V-251005
- Rule IDs
-
- SV-251005r1028243_rule
Checks: C-54440r1004888_chk
Determine if the Sentry has a public certificate from an approved Certificate Authority. From MobileIron Core: 1. Log in to the MobileIron Core. 2. Navigate to "Services". 3. Select "Sentry". 4. On each configured Sentry, select "View Certificate". 5. Validate the Public Key is issued from an approved Certificate Authority. From Sentry: 1. Log in to the Sentry. 2. Navigate to "Security". 3. Scroll down to "Certificate Mgmt". 4. Select "View Certificate". If approved certificates have not been uploaded, this is a finding.
Fix: F-54394r1004889_fix
Configure the Sentry with a certificate from an approved Certificate Authority. From MobileIron Core: 1. Log in to the MobileIron Core. 2. Navigate to "Services". 3. Select "Sentry". 4. On each configured Sentry, select "Manage Certificate". 5. Upload appropriate certificate. From Sentry: 1. Log in to the Sentry. 2. Navigate to "Security". 3. Select "Certificate Management". 4. Select "Manage Certificate". 5. Upload appropriate certificate. Reference "Sentry Guide for MobileIron Core" for uploading a certificate to Sentry, section "Standalone Sentry Certificate".
- RMF Control
- SI-2
- Severity
- H
- CCI
- CCI-002605
- Version
- MOIS-ND-000980
- Vuln IDs
-
- V-251006
- Rule IDs
-
- SV-251006r1028244_rule
Checks: C-54441r1004891_chk
To identify/validate Sentry support for syslog forwarding, follow the navigation steps below. 1. Log in to the Sentry. 2. Navigate to "Settings". 3. Scroll down to "Syslog". 4. Verify that a syslog server has been configured correctly. a. Verify Server IP address. b. Verify Port. c. Verify Facility Types. d. Verify Admin state is enabled. If syslog forwarding has not been implemented, this is a finding.
Fix: F-54395r1004892_fix
Configure the Sentry to forward syslog data using the steps below Refer to "Sentry Guide for Core", section "Syslog", page 140. 1. Log in to the Sentry. 2. Navigate to "Settings". 3. Scroll down to "Syslog". 4. If there is no syslog server entry, ADD the server: a. Add Server IP address. b. Add Port. c. Select/add Facility Types and Log Levels. d. Enable Admin state.
- RMF Control
- CM-6
- Severity
- H
- CCI
- CCI-000366
- Version
- MOIS-ND-000990
- Vuln IDs
-
- V-251007
- Rule IDs
-
- SV-251007r1028245_rule
Checks: C-54442r1004894_chk
Verify the Sentry is a supported version. 1. Enter the Sentry System Manager Portal URL in a web browser. 2. View the version number in the top right corner. 3. Check the MI Support page (help.mobileiron.com) to ensure the MI Sentry is a supported version. If the version number of the Sentry appliance is not supported, this is a finding.
Fix: F-54396r802242_fix
Install the most current MobileIron supported version of Sentry.