| Target | CPE Name |
|---|---|
| Good Domino Mobile Control (GMC) Server 1.0.3 | cpe:/a:gooddomino:mobile_control_server:1.0.3 (View CVEs) |
| Good Domino Mobile Messaging (GMM) Server 6.0.3 | cpe:/a:gooddomino:mobile_messaging_server:6.0.3 (View CVEs) |
| Good Domino Mobile Messaging Client 6.0.1 | cpe:/a:gooddomino:mobile_messaging_client:6.0.1 (View CVEs) |
| Microsoft Windows Phone 6.5 | cpe:/o:microsoft:windows_mobile:6.5::smartphone (View CVEs) |
The Windows Phone Security Technical Implementation Guide (STIG) and associated documents (e.g., Windows Phone 6.5 Overview, Good Technology Hardening Guide, Windows Phone 6.5 (with Good Technology’s Good Mobility Suite (GMS)) STIG, GMS Server (Windows Phone) STIG, Smartphone Policy STIG, General Wireless Policy STIG, and Wireless Management Server Policy STIG), provide security policy and configuration requirements for the use of any handheld device using Windows Phone devices in the Department of Defense (DoD). Guidance in these documents applies to all DoD Windows Phone systems used to store, process, transmit, or receive DoD information. This STIG requires the use of a third-party security program/server (GMS) to provide secure email, security policy management, and data protection services on DoD Windows Phone devices. Future versions of the Windows Phone STIG may include other third-party vendor security products or a "native" Windows Phone configuration when it has been determined that they provide required DoD security controls. The STIG serves as both a security review checklist and a configuration guide. Information Assurance Officers (IAOs), Security Managers (SMs), System Administrators (SAs), device users, and Security Readiness Review (SRR) Reviewers should use the STIG to ensure the security of DoD Windows Phone devices. This STIG has the minimum "baseline" Windows Phone security guidance for DoD. Combatant Commanders/Services/Agencies (CC/S/A) may direct more secure configuration settings based on operational requirements.
Not provided.
This document is a requirement for all DoD-administered systems and all systems connected to DoD networks. These requirements are designed to assist SMs, Information Assurance Managers (IAMs), IAOs, and SAs with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts.
Not provided.
DoD Directive (DoDD) 8500.1
Not provided.
Not provided.
Not provided.
Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil
Not provided.
Not provided.
Version 1, Release 2 - 28 October 2011 Version 1, Release 1 - 29 April 2011 Updated "Point of Contact" - 04 March 2015 Changed Status from "Under Review" to "Final" - 26 May 2015 Updated URL to reflect change to the DISA website - http --> https moved to archive status - 4/15/19
| URL | Description |
|---|
| Reference URL | Description |
|---|