UCF STIG Viewer Logo

Windows 10 Mobile must be configured to disable automatic updates of system software.


Overview

Finding ID Version Rule ID IA Controls Severity
V-70099 MSWM-10-201901 SV-84721r1_rule Medium
Description
FOTA allows the user to download and install firmware updates over-the-air. These updates can include OS upgrades, security patches, bug fixes, new features and applications. Since the updates are controlled by the carriers, DoD will not have an opportunity to review and update policies prior to update availability to end users. Disabling FOTA will mitigate the risk of allowing users access to applications that could compromise DoD sensitive data. After reviewing the update and adjusting any necessary policies (i.e., disabling applications determined to pose risk), the administrator can re-enable FOTA. SFR ID: FMT_SMF_EXT.1.1 #45
STIG Date
Microsoft Windows 10 Mobile Security Technical Implementation Guide 2016-09-26

Details

Check Text ( C-70575r1_chk )
Review Windows 10 Mobile documentation and inspect the configuration on Windows 10 Mobile to disable automatic updates of system software.

This validation procedure is performed only on the MDM administration console.

On the MDM administration console:

1. Ask the MDM administrator to verify the OS Upgrade compliance policies.
2. Find the settings for restricting OS updates.
3. Verify the "Update/AllowAutoUpdate" policy is set to a value of "5" and "Update/RequireDeferUpgrade" policy is set to a value of "1".

If the MDM does not have a compliance policy that set the value of "Update/AllowAutoUpdate" to "5" and the value of "Update/RequireDeferUpgrade" to "1", this is a finding.
Fix Text (F-76335r1_fix)
Configure the MDM system to enforce a policy which configures the "Update/AllowAutoUpdate" and "Update/RequireDeferUpgrade" policies.

Update/AllowAutoUpdate prevents automatic upgrades from being deployed and should be set to a value of 5 – Turn off automatic updates and Update/RequireDeferUpgrade which enables upgrades to be deferred until a later time under administrator control. This needs to be set to a value of 1 – Upgrades are paused.

Deploy the MDM policy to managed devices.

Note: These policies require that phones are upgraded to Windows 10 Mobile Enterprise.