STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

V-259981

CAT II (Medium)

The Enterprise Voice, Video, and Messaging Endpoint must be configured to dynamically implement configuration file changes.

Rule ID

SV-259981r948910_rule

STIG

Enterprise Voice, Video, and Messaging Endpoint Security Requirements Guide

Version

V1R3

CCIs

CCI-000366

Discussion

Configuration management includes the management of security features and assurances through control of changes made to device hardware, software, and firmware throughout the life cycle of a product. Secure configuration management relies on performance and functional attributes of products to determine the appropriate security features and assurances used to measure a system configuration state. When configuration changes are made, it is critical for those changes to be implemented by the Enterprise Voice, Video, and Messaging Endpoint as quickly as possible. This ensures that Enterprise Voice, Video, and Messaging Endpoints communicate using the correct address books, session managers, gateways, and border elements.

Check Content

Verify the Enterprise Voice, Video, and Messaging Endpoint dynamically implements configuration file changes. 

If the Enterprise Voice, Video, and Messaging Endpoint does not dynamically implement configuration file changes, this is a finding.

Fix Text

Configure the Enterprise Voice, Video, and Messaging Endpoint to dynamically implement configuration file changes.