UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The organization must monitor for unauthorized wireless connections to the information system at an organization defined time period.


Overview

Finding ID Version Rule ID IA Controls Severity
V-35919 SRG-MPOL-005 SV-47235r1_rule Medium
Description
DoD networks are at risk, and DoD data could be compromised if wireless scanning is not conducted to identify unauthorized WLAN clients and access points connected to, or attempting to, connect to the network. DoD components will ensure a Wireless Intrusion detection System (WIDS) is implemented that allows for monitoring of WLAN activity and the detection of WLAN-related policy violations on all unclassified and classified DoD wired and wireless LANs. The WIDS shall be capable of monitoring Wi-Fi transmissions within all DoD LAN environments and detecting nearby unauthorized WLAN devices. WIDS are not required to monitor non-Wi-Fi transmissions.
STIG Date
Mobile Policy Security Requirements Guide 2013-01-24

Details

Check Text ( C-44158r1_chk )
Review the site's network monitoring and scanning procedures. Determine if monitoring of the WIDS is being conducted at an organized defined time period.

If WIDS monitoring is not being performed at an organization defined time period, this is a finding.
Fix Text (F-40445r1_fix)
Monitor for unauthorized wireless connections to the information system at an organization defined time period.