Select any two versions of this STIG to compare the individual requirements
Select any old version/release of this STIG to view the previous requirements
Use the following procedure to verify logging of all commands issued to the MDM Agent has been configured on the SDS EMM server: On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Service Overview >> Log and Event >> Audit Event. 3. Verify all audit events with Type as "Server" and Event Category as "Device Command" have been selected. If logging of all commands issued to the MDM Agent has not been configured on the SDS EMM server, this is a finding.
Use the following instructions to configure logging of all commands issued to the MDM Agent on the SDS EMM server: On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Service Overview >> Log and Event >> Audit Event. 3. Select Type as "Server" and Event Category as "Device Command". 4. Check the audit target and click the "Save" button at the top of the page.
Use the following procedure to verify the command to read audits to the MDM Agent has been configured on the SDS EMM server: On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Service Overview >> Log and Event >> Audit Log. 3. Verify all audit events with audit type of "Device" have been selected. If the command for reading audits to the MDM Agent has not been configured on the SDS EMM server, this is a finding.
Use the following instructions to verify the command has been configured to read audits to the MDM Agent on the SDS EMM server: On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Service Overview >> Log and Event >> Audit Event. 3. Select all audit events with audit type of "Device" and click the "Save" button.
Review the Samsung SDS EMM or platform configuration and verify the server is configured to lock after 15 minutes of inactivity. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Click the arrow next to the Admin account ID in the header of main page and verify the "Set Session Timeout" is set to 15 minutes or less. If the MDM console session time out is not set to 15 minutes or less, this is a finding.
Configure the Samsung SDS EMM or platform to lock the server after 15 minutes of inactivity. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Click the arrow next to the Admin account ID in the header of the main page and select "Set Session Timeout". 3. Enter 15 minutes in "Session Timeout (min)" and click "Save".
Review the Samsung SDS EMM configuration settings and verify the server is configured to transfer Samsung SDS EMM logs to another server for storage, analysis, and reporting. On the MDM console, do the following: 1. Go to Setting >> Server >> Configuration. 2. Click "Audit" at the top of the window and verify audit log server and other information is listed. If the MDM console is not configured to transfer audit logs to an audit log server, this is a finding. Note: Samsung SDS EMM logs include logs of MDM events and logs transferred to the Samsung SDS EMM by MDM agents of managed devices.
Configure the Samsung SDS EMM to transfer Samsung SDS EMM logs to another server for storage, analysis, and reporting. On the MDM console, do the following: 1. Go to Setting >> Server >> Configuration. 2. Click "Audit" at the top of the window and enter the audit log server and other information.
Review Samsung SDS EMM server documentation and configuration settings to determine if the warning banner is using the appropriate designated wording. On the MDM console, do the following: 1. Log in to the Samsung SDS EMM Server Admin Console using a web browser. 2. Go to Settings >> Admin Console >> Logo Setting. 3. Verify the text in the "Logo/Notification" window that appears. Confirm the text in the Login Notification box is the required DoD banner text. Alternately, verify the banner is correct during logon to the console. If the warning banner is not set up on the Samsung SDS EMM or wording does not exactly match the requirement text, this is a finding.
Configure the Samsung SDS EMM to display the appropriate warning banner text. Install Samsung SDS EMM patch 2.2.5.1 Build 200707. On the EMM console, do the following: 1. Log in to the Samsung SDS EMM Server Admin Console using a web browser. 2. Go to Settings >> Admin Console >> Logo Setting and click in the text box and type or paste the DoD banner. 3. Click "Save".
Review the MDM agent configuration settings to determine if the agent is configured with a periodicity of reachable events set to six hours or less. This validation procedure is performed on the Samsung SDS EMM Server Admin Console. 1. Log in to the Samsung SDS EMM Server Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration. 3. For Android: On row 27 verify "Inventory Collection Period for Android (hr)" is set to "6" or less. 4. For iOS: On row 28 verify "Inventory Collection Period for iOS (hr)" is set to "6" or less. If the periodicity of reachable events is not set to "6" hours or less, this is a finding.
Configure the MDM agent periodicity of reachable events to six hours or less. On the MDM console, do the following: 1. Log in to the Samsung SDS EMM Server Admin Console using a web browser. 2. Go to Settings >> Server >> Configuration. 3. For Android: Ensure that row 27 "Inventory Collection Period for Android (hr)" shows a value of "6" or less. 4. For iOS: Ensure that row 28 "Inventory Collection Period for iOS (hr)" shows a value of "6" or less. 5. Click on the check-mark box in the top left of the "Configuration" screen to "Apply Changes". 6. Click "OK" on the "Notify" save completed window.
Review the Samsung SDS EMM configuration settings and verify the server is configured with the following Administrator roles: - Server primary administrator - Security configuration administrator - Device user group administrator - Auditor This validation procedure is performed on the MDM Administration Console. On the MDM console, do the following to verify that users in the roles (b), (c), and (d) exist: 1. Log in to the Samsung SDS EMM Server Admin Console using a web browser. 2. Go to Settings >> Admin Console >> Administrators. 3. Observe that the user with the Security configuration administrator role is in the list on this screen, that the "Type" column indicates "Super", and that a modify symbol appears under all of the columns for "App", "Cert", "Org", "Profile", "Portal", and "Audit". 4. Observe that the user with the Device user group administrator role is in the list on this screen, that the "Type" column indicates "Common", and that a modify symbol appears under all of the columns for "App", "Cert", "Org", "Profile", "Portal", and "Audit". 5. Observe that the user with the Auditor role is in the list on this screen, that the "Type" column indicates "Common", and that a modify symbol appears only under the "Audit" column. No verification is needed for the Server primary administrator since this role is always created automatically during server install. If the MDM console is not configured with the required Administrator roles, this is a finding.
Configure the Samsung SDS EMM with the following Administrator roles: - Server primary administrator - Security configuration administrator - Device user group administrator - Auditor On the MDM console, do the following to create users in the roles (b), (c) and (d): 1. Log in to the Samsung SDS EMM Server Admin Console using a web browser. 2. Go to Settings >> Admin Console >> Administrators and click on the "+" button near the top of the screen. 3. In the "Add Administrator" window, fill in the following once for each user account being created: a. Choose the "New" radio button. b. Fill in the "Admin ID" and "Admin Name" fields with a value for a new user. c. To create a Security configuration administrator, do the following: Set the Type field to "Super". d. To create a Device user group administrator, do the following: Set the Type field to "Common" and check all of the "Authorization" boxes. e. To create an Auditor, do the following: Set the Type field to "common" and check only the Audit box. 4. Choose "Save" to create the account with the specified role. 5. Click "Yes" in next dialog box (Save box) to complete setup of user. A user in the Server Primary Administrator role is created by defining a Windows Administrator account on the platform running the Samsung SDS EMM server. This is automatically created during server install.
Review the event log to verify the following events are logged: - Change in enrollment status - Failure to apply policies to a mobile device - Startup and shutdown of the MDM System - All administrative actions On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Service Overview >> Log and Event >> Audit Event. 3. Search on "Enrollment" and verify each "Console" and "Device" audit event are selected to audit Change in enrollment status. 4. Search on "Policy" and verify "Agent Policy Apply Success on a Device" (Event ID CPLC0029) and "Failed to apply Agent policy on Device" (Event ID CPLC0030) are selected to audit Failure to apply policies to a mobile device. 5. Search on "Start" and verify "Start up EMM Server" (Event ID CACS0001) is selected. Search on "shut down" and verify "Shut Down EMM Server" (Event ID CACS0002) is selected to audit startup and shutdown of the MDM System. 6. Verify all audit events with the event category of Admin Login, Administrators, Alerts, Dashboard, Device, Devices, Group, Logs, Profiles, and User Management are selected to audit all Administrative actions. If the following required audit events have not been selected, this is a finding. - Change in enrollment status - Failure to apply policies to a mobile device - Startup and shutdown of the MDM System - All administrative actions
Configure the Samsung SDS EMM to implement the required audit events. - Change in enrollment status - Failure to apply policies to a mobile device - Startup and shutdown of the MDM System - All administrative actions On the MDM console, do the following to define audit events: 1. Log in to the Admin Console using a web browser. 2. Go to Service Overview >> Log and Event >> Audit Event. 3. Search on "Enrollment" and select each "Console" and "Device" audit event to audit Change in enrollment status. 4. Search on "Policy" and select events "Agent Policy Apply Success on a Device" (Event ID CPLC0029) and "Failed to apply Agent policy on Device" (Event ID CPLC0030) to audit Failure to apply policies to a mobile device. 5. Search on "Start" and select event "Start up EMM Server" (Event ID CACS0001) and search on "shut down" and select event "Shut Down EMM Server" (Event ID CACS0002) to audit startup and shutdown of the MDM System. 6. Select all audit events with the event category of Admin Login, Administrators, Alerts, Dashboard, Device, Devices, Group, Logs, Profiles, and User Management to audit all Administrative actions.
Review Samsung SDS EMM server documentation and configuration settings to determine if the warning banner is using the appropriate designated wording. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and click "EULA" at the top of the window. 3. Check the required DoD text in the EULA "Content" box. If the warning banner is not set up on the MDM server or wording does not exactly match the VulDiscussion text, this is a finding.
Configure the MDM server to display the appropriate warning banner text. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and click "EULA" on the top of the window. 3. Enter required DoD text in the EULA "Content" box. 4. Click "Save".
Verify the EMM server has not been configured to use one-time password (OTP) for administrator logon to the server. On the MDM console, do the following: 1. Log into the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Two-Factor Authentication. 3. Verify Two-Factor Authentication is set to "No". If the EMM server has not been configured to disable one-time-password (OTP) for administrator logon to the server, this is a finding.
Use the following procedure for configuring the use of OTP authentication on the EMM server: On the MDM console, do the following: 1. Log into the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Two-Factor Authentication. 3. Set Two-Factor Authentication to "No". 4. Save setting.
Verify the installed version of the Samsung SDS EMM server is a supported version. A list of supported versions of EMM can be found at http://support.samsungsds.com. (Note: An account is needed to access this web page. The site EMM system administrator should be able to access the site and print the list for the reviewer/auditor.) For viewing the installed version of EMM, on the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Check the version by version number and deploy date at the bottom left on the screen. 3. Verify the version is on the list of supported versions on the Samsung SDS website. If the installed version of Samsung SDS EMM server is not a supported version, this is a finding.
For viewing the installed version of EMM, on the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Check the version by version number and deploy date at the bottom left on the screen. 3. Verify the installed version of the Samsung SDS EMM server is a supported version. A list of supported versions of EMM can be found at http://support.samsungsds.com. (Note: An account is needed to access this web page. The site EMM system administrator should be able to access the site and print the list for the reviewer/auditor.) 4. Install a supported version of SDS EMM using Samsung SDS published procedures. To get the EMM Installer and apk file, contact the EMM technical support team.
Review the Samsung SDS EMM platform configuration to determine whether a DoD-approved firewall is installed or if the platform operating system provides a firewall service that can restrict both inbound and outbound traffic by TCP/UDP port and IP address. If there is not a host-based firewall present on the Samsung SDS EMM platform, this is a finding.
Install a DoD-approved firewall.
Ask the MDM administrator for a list of ports, protocols, and IP address ranges necessary to support Samsung SDS EMM and platform functionality. A list can usually be found in the STIG Supplemental document or MDM product documentation. Compare the list against the configuration of the firewall and identify discrepancies. If the host-based firewall is not configured to support only ports, protocols, and IP address ranges necessary for operation, this is a finding.
Configure the firewall on the Samsung SDS EMM to only permit ports, protocols, and IP address ranges necessary for operation.
Ask the MDM administrator for a list of ports, protocols, and services that have been configured on the host-based firewall of the Samsung SDS EMM or generate the list by inspecting the firewall. Verify all allowed ports, protocols, and services are included on the DoD PPSM CAL list. If any allowed ports, protocols, and services on the MDM host-based firewall are not included on the DoD PPSM CAL list, this is a finding.
Turn off any ports, protocols, and services on the MDM host-based firewall that are not on the DoD PPSM CAL list.
Review the Samsung SDS EMM configuration settings and verify the server is configured to limit the number of concurrent sessions to one session for all accounts and/or account types. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and verify Multiple login is set to "Disallow." If the MDM console Multiple login is not set to "Disallow", this is a finding.
Configure the Samsung SDS EMM to limit the number of concurrent sessions to one session all accounts and/or account types. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and check Multiple login as "Disallow."
Review Samsung SDS EMM server documentation and configuration settings to determine if the admin account is automatically disabled after 35 days. On the MDM console, verify that the MDM console Inactivity Limit on Admin Accounts (days) is set to "35". If sub-administrators or read-only administrators do not sign in for 35 days, their accounts are locked. If the MDM console Inactivity Limit on Admin Accounts (days) is not set to "35", this is a finding.
Configure the Samsung SDS EMM to disable accounts after 35 days. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and set Inactivity Limit on Admin Accounts (days) to "35" days. 3. Click the "Save" button.
Review the Samsung SDS EMM configuration settings and verify the server is configured to enforce the limit of three consecutive invalid logon attempts by admin. On the MDM console, verify that the MDM console "Maximum Failed Login Attempts" is set to "3". If the administrator incorrectly enters the login password three times, the account is locked. If the MDM console Maximum Failed Login Attempts is not set to "3", this is a finding.
Configure the Samsung SDS EMM to enforce the limit of three consecutive invalid logon attempts by an admin. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and set "Maximum Failed Login Attempts" to "3".
Review the Samsung SDS EMM configuration settings and verify the server is configured to use multifactor authentication for local access to privileged accounts. On the MDM console, do the following: 1. In the Admin Console login page, enter the Admin ID and password and click the "Sign in" button. 2. Enter the OTP (one-time password) in the pop-up by sending SMS or email that is registered in admin account information. 3. Login is successful. If the OTP pop-up does not display, this is a finding.
Configure the Samsung SDS EMM to use multifactor authentication for local access to privileged accounts. On the MDM console, do the following: 1. Log in to the Admin Console using a web browser. 2. Go to Setting >> Server >> Configuration and set Two-Factor Authentication to "Yes". 3. Click "Save".
Verify SDS EMM is leveraging the MDM platform administrator accounts and groups for user (system administrator) identification and CAC authentication. Use one of the following methods: Method 1: - Attempt to log on to the SDS EMM console using a CAC. - Verify CAC log on was successful. Method 2: - Log in to the SDS EMM console. - Go to Settings >> Server >> Configuration. - Click "CAC Sign-In". - Verify CAC Sign-In has been set up. If SDS EMM is not leveraging the MDM platform administrator accounts and groups for user (system administrator) identification and CAC authentication, this is a finding.
Configure SDS EMM to leverage the MDM platform administrator accounts and groups for user (system administrator) identification and CAC authentication. Complete the following procedures: 1. Follow necessary setup steps for Admin Registration, Tomcat Server Settings, Directory Settings found on the top of page 536 of the Samsung SDS EMM 2.2.5.3 Administrator Guide. (Refer to the "CAC Sign-In" section of the Appendix of the Samsung SDS EMM 2.2.5.3 Administrator Guide for detailed setting procedures in the CAC authentication/Directory Services environment for the SDS EMM) 2. Enable CAC Sign-In by the following procedure: - Log in to the SDS EMM console. - Go to Settings >> Server >> Configuration. - Click "CAC Sign-In". - Configure the "CAC Sign-In Settings", Port", and "Directory Service Name". - Click Save.
Verify SDS EMM is leveraging the MDM platform administrator accounts and groups for user (system administrator) identification and CAC authentication. Use one of the following methods: Method 1: - Attempt to log on to the SDS EMM console using a CAC. - Verify CAC log on was successful. Method 2: - Log in to the SDS EMM console. - Go to Settings >> Server >> Configuration. - Click "CAC Sign-In". - Verify CAC Sign-In has been set up. If SDS EMM is not leveraging the MDM platform administrator accounts and groups for user (system administrator) identification and CAC authentication, this is a finding.
Configure SDS EMM to leverage the MDM platform administrator accounts and groups for user (system administrator) identification and CAC authentication. Complete the following procedures: 1. Follow necessary setup steps for Admin Registration, Tomcat Server Settings, Directory Settings found on the top of page 536 of the Samsung SDS EMM 2.2.5.3 Administrator Guide. (Refer to the "CAC Sign-In" section of the Appendix of the Samsung SDS EMM 2.2.5.3 Administrator Guide for detailed setting procedures in the CAC authentication/Directory Services environment for the SDS EMM) 2. Enable CAC Sign-In by the following procedure: - Log in to the SDS EMM console. - Go to Settings >> Server >> Configuration. - Click "CAC Sign-In". - Configure the "CAC Sign-In Settings", Port", and "Directory Service Name". - Click Save.
Verify Samsung SDS EMM local accounts have been configured with a password with length of 15 characters or more. 1. Log into the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Minimum Password Length. 3. Verify the Minimum Password Length is set to 15 or more. If the Minimum Password Length is not set to 15 or more, this is a finding.
Configure Samsung SDS EMM local accounts password with length of 15 characters or more. On the MDM console, do the following: 1. Log into the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Minimum Password Length. 3. Set the Minimum Password Length to 15. 4. Save setting.
Verify Samsung SDS EMM local accounts have been configured to prohibit password reuse for a minimum of five generations. 1. Log in to the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Manage Password History (Times). 3. Verify the Manage Password History (Times) is set to 5. If the Manage Password History (Times) is not set to 5, this is a finding.
Configure Samsung SDS EMM local accounts with password maximum lifetime of 60 Days. On the MDM console, do the following: 1. Log in to the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Manage Validity Period (Days). 3. Set the Manage Validity Period (Days) to 60. 4. Save setting.
Verify Samsung SDS EMM local accounts have been configured to prohibit password reuse for a minimum of five generations. 1. Log in to the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Manage Password History (Times). 3. Verify the Manage Password History (Times) is set to 5. If the Manage Password History (Times) is not set to 5, this is a finding.
Configure Samsung SDS EMM local accounts to prohibit password reuse for a minimum of five generations. On the MDM console, do the following: 1. Log in to the SDS EMM console. 2. Go to Setting >> Server >> Configuration >> Manage Password History (Times). 3. Set the Manage Password History (Times) to 5. 4. Save setting.