From MobileIron Core v9.x MDM Security Technical Implementation Guide
Part of PP-MDM-201101
Associated with: CCI-002696
Mobile devices that do not enforce security policy or verify the status of the device are vulnerable to a variety of attacks. The key security function of MDM technology is to distribute mobile device security polices in such a manner that they are enforced on managed mobile devices. To accomplish this function, the MDM agent must verify the status and other key information of the managed device and report that status to the MDM server periodically.
Configure the MobileIron Core Server for the periodicity of reachability events for six hours or less. 1. Log into the MobileIron Core Server Admin Portal using a web browser. 2. Select "Policies & Configs" on the web page. 3. Select "Policies" on the web page. 4. Select each applicable Sync policy on the web page. 5. Examine the Sync Interval in each case to ensure it is less than six hours as required. If the Sync Interval is more than six hours for any Sync policy, this is a finding.
Configure the MobileIron Core Server for the periodicity of reachability events for six hours or less. 1. Log into the MobileIron Core Server Admin Portal using a web browser. 2. Select "Policies & Configs" on the web page. 3. Select "Policies" on the web page. 4. Select and edit each applicable Sync policy on the web page. 5. Set the Sync Interval in each case to six hours or less as required.
Lavender hyperlinks in small type off to the right (of CSS
class id
, if you view the page source) point to
globally unique URIs for each document and item. Copy the
link location and paste anywhere you need to talk
unambiguously about these things.
You can obtain data about documents and items in other
formats. Simply provide an HTTP header Accept:
text/turtle
or
Accept: application/rdf+xml
.
Powered by sagemincer