STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

V-259981

CAT II (Medium)

The Enterprise Voice, Video, and Messaging Endpoint must be configured to dynamically implement configuration file changes.

Rule ID

SV-259981r948910_rule

STIG

Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

Version

V1R3

CCIs

CCI-000366

Discussion

Configuration management includes the management of security features and assurances through control of changes made to device hardware, software, and firmware throughout the life cycle of a product. Secure configuration management relies on performance and functional attributes of products to determine the appropriate security features and assurances used to measure a system configuration state. When configuration changes are made, it is critical for those changes to be implemented by the Enterprise Voice, Video, and Messaging Endpoint as quickly as possible. This ensures that Enterprise Voice, Video, and Messaging Endpoints communicate using the correct address books, session managers, gateways, and border elements.

Check Content

Verify the Enterprise Voice, Video, and Messaging Endpoint dynamically implements configuration file changes. 

If the Enterprise Voice, Video, and Messaging Endpoint does not dynamically implement configuration file changes, this is a finding.

Fix Text

Configure the Enterprise Voice, Video, and Messaging Endpoint to dynamically implement configuration file changes.