Rule ID
SV-278018r1180760_rule
Version
V1R1
CCIs
Unnecessary applications and/or services such as Bluetooth could allow an attacker to connect with intentions to take over or disrupt the system.
In the Windows search bar, type "Services". In the Services "Name" column look for the "Bluetooth Support Service". If this is set to "automatic", this is a finding.
Validate the site documentation to ensure the approval of use for Wi-Fi server connections. If the connection has not been approved, type "Services" in the Windows search bar. In the Services "Name " column, look for the "Bluetooth Support Service" and set this to "Disabled". Any Bluetooth devices listed or in use must be documented and approved by the information system security officer (ISSO) or authorizing official (AO).