Skip to content

Ivanti EPMM Server Security Technical Implementation Guide

Rules, Groups, and Values defined within the XCCDF Benchmark

  • SRG-APP-000167-UEM-000097

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must enforce password complexity by requiring that at least one lowercase character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000168-UEM-000098

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must enforce password complexity by requiring that at least one numeric character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000169-UEM-000099

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must enforce password complexity by requiring that at least one special character be used.

    &lt;VulnDiscussion&gt;Use of a complex password helps to increase the time and resources required to compromise the password. Password complexity, ...
    Rule Medium Severity
  • SRG-APP-000179-UEM-000110

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must use FIPS-validated SHA-2 or higher hash function to protect the integrity of keyed-hash message authentication code (HMAC), Key Derivation Functions (KDFs), Random Bit Generation, and hash-only applications.

    &lt;VulnDiscussion&gt;Without cryptographic integrity protections, information can be altered by unauthorized users without detection. Nonlocal ma...
    Rule High Severity
  • SRG-APP-000295-UEM-000169

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must automatically terminate a user session after an organization-defined period of user inactivity.

    &lt;VulnDiscussion&gt;Automatic session termination addresses the termination of user-initiated logical sessions in contrast to the termination of ...
    Rule Medium Severity
  • SRG-APP-000358-UEM-000228

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must be configured to transfer Ivanti EPMM server logs to another server for storage, analysis, and reporting. Note: Ivanti EPMM server logs include logs of UEM events and logs transferred to the Ivanti EPMM server by UEM agents of managed devices.

    &lt;VulnDiscussion&gt;Information stored in one location is vulnerable to accidental or incidental deletion or alteration. Off-loading is a common...
    Rule Medium Severity
  • SRG-APP-000412-UEM-000283

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.

    &lt;VulnDiscussion&gt;Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote...
    Rule High Severity
  • SRG-APP-000427-UEM-000298

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must only allow the use of DoD PKI established certificate authorities for verification of the establishment of protected sessions.

    &lt;VulnDiscussion&gt;Untrusted Certificate Authorities (CA) can issue certificates, but they may be issued by organizations or individuals that se...
    Rule Medium Severity
  • SRG-APP-000456-UEM-000330

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must be maintained at a supported version.

    &lt;VulnDiscussion&gt;The UEM vendor maintains specific product versions for a specific period of time. MDM/EMM server versions no longer supported...
    Rule High Severity
  • SRG-APP-000472-UEM-000347

    <GroupDescription></GroupDescription>
    Group
  • The Ivanti EPMM server must be configured with the periodicity of the following commands to the agent of six hours or less: - query connectivity status - query the current version of the managed device firmware/software - query the current version of installed mobile applications - read audit logs kept by the managed device.

    &lt;VulnDiscussion&gt;Without verification, security functions may not operate correctly and this failure may go unnoticed. Security function is d...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules