STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple iOS/iPadOS 18 Security Technical Implementation Guide

V-276196

CAT II (Medium)

DOD Apple iOS/iPadOS 18 devices must disable FaceTime.

Rule ID

SV-276196r1115625_rule

STIG

Apple iOS/iPadOS 18 Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000366

Discussion

FaceTime is considered a personal use feature.

Check Content

This a supervised-only control. If the iPhone or iPad being reviewed is not supervised by the MDM, this control is automatically a finding.

If the iPhone or iPad being reviewed is supervised by the MDM, follow these procedures:

This check procedure is performed on both the device management tool and the iPhone and iPad device.

Note: If an organization has multiple configuration profiles, the check procedure must be performed on the relevant configuration profiles applicable to the scope of the review. 

In the iOS/iPadOS management tool, verify "Allow FaceTime" is unchecked.

On the iPhone/iPad device:
1. Open the Settings app.
2. Tap "General".
3. Tap "VPN & Device Management". 
4. Tap the Configuration Profile from the iOS management tool containing the restrictions policy.
5. Tap "Restrictions".
6. Verify "FaceTime not allowed" is listed.

If "Allow FaceTime" is listed in the management tool or "FaceTime not allowed" is not listed on the Apple device, this is a finding.

Fix Text

Install a configuration profile to disable FaceTime. This a supervised-only control.