UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

Windows 10 Mobile must be configured to implement the management setting: Disable the ability for a device to send out advertisements/Bluetooth beacons to a Bluetooth peripheral.


Overview

Finding ID Version Rule ID IA Controls Severity
V-70085 MSWM-10-200512 SV-84707r1_rule Medium
Description
Bluetooth usage could provide an attack vector for a hacker to connect to a mobile OS device without the knowledge of the user. Disabling Bluetooth advertising/beaconing reduces the risk of a non-authorized Bluetooth device connecting the DoD mobile OS device. SFR ID: FMT_SMF_EXT.1.1 #20d
STIG Date
Microsoft Windows 10 Mobile Security Technical Implementation Guide 2017-09-11

Details

Check Text ( C-70561r1_chk )
Review Windows 10 Mobile configuration settings to determine if the mobile device is enforcing the policy to prevent Bluetooth Low Energy (LE) apps from doing any Bluetooth advertising.

This validation procedure is performed only on the MDM administration console.

Check whether the appropriate setting is configured on the MDM.

Administration Console:

1. Ask the MDM administrator to show the Bluetooth device advertising" security policy.
2. Verify the "allow Bluetooth device advertising" security policy was set to disallowed for Windows 10 Mobile devices.

If the MDM does not disable the policy for "allow Bluetooth device advertising", this is a finding.
Fix Text (F-76321r1_fix)
Configure the MDM system to enforce a policy that restricts "allow Bluetooth device advertising" policy to prevent low energy Bluetooth devices from advertising.

Deploy the policy on managed devices.