STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 2 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Ivanti EPMM Server Security Technical Implementation Guide

V-251416

CAT I (High)

The Ivanti EPMM server must configure web management tools with FIPS-validated Advanced Encryption Standard (AES) cipher block algorithm to protect the confidentiality of maintenance and diagnostic communications for nonlocal maintenance sessions.

Rule ID

SV-251416r1004743_rule

STIG

Ivanti EPMM Server Security Technical Implementation Guide

Version

V3R1

CCIs

CCI-003123

Discussion

Without confidentiality protection mechanisms, unauthorized individuals may gain access to sensitive information via a remote access session. Nonlocal maintenance and diagnostic activities are activities conducted by individuals communicating through either an external network (e.g., the internet) or an internal network.

Check Content

Verify MobileIron Core is in FIPS mode. 

ssh to command line console of the Core. Enable >> show fips. Verify FIPS mode is configured.

If FIPS mode is not configured, this is a finding.

Fix Text

Configure Core to be in FIPS mode.

ssh to command line console of the Core. Enable >> show fips. Configure fips >> reload.