STIGQter STIGQter: STIG Summary: Motorola Android 9.x COPE Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 14 Oct 2020:

Motorola Android Pie must be configured to disallow outgoing beam.

DISA Rule

SV-230107r569708_rule

Vulnerability Number

V-230107

Group Title

GOOG-09-010400

Rule Version

MOTO-09-010400

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Motorola Android Pie device to disallow outgoing beam.

On the MDM console, in the Android user restrictions section, set "Disallow outgoing beam" to "On".

Check Contents

Review the Motorola Android Pie device configuration settings to confirm that outgoing beam is disallowed.

This procedure is performed on both the MDM Administration console and the Motorola Android Pie device.

On the MDM console, in the Android user restrictions section, verify that "Disallow outgoing beam" is set to "On".

On the Android Pie device:
1. Open Settings.
2. Tap "Connected devices".
3. Tap "Connection preferences".
4. Verify that "Android Beam" is off and grayed out.

If on the MDM console "Disallow outgoing beam" is not set to "On", or On the Android Pie device "Android Beam" is not off and grayed out, this is a finding.

Vulnerability Number

V-230107

Documentable

False

Rule Version

MOTO-09-010400

Severity Override Guidance

Review the Motorola Android Pie device configuration settings to confirm that outgoing beam is disallowed.

This procedure is performed on both the MDM Administration console and the Motorola Android Pie device.

On the MDM console, in the Android user restrictions section, verify that "Disallow outgoing beam" is set to "On".

On the Android Pie device:
1. Open Settings.
2. Tap "Connected devices".
3. Tap "Connection preferences".
4. Verify that "Android Beam" is off and grayed out.

If on the MDM console "Disallow outgoing beam" is not set to "On", or On the Android Pie device "Android Beam" is not off and grayed out, this is a finding.

Check Content Reference

M

Target Key

4230

Comments