STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 3 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Samsung Android 16 COBO Security Technical Implementation Guide

V-276549

CAT II (Medium)

Samsung Android must be configured to disable ad hoc wireless client-to-client connection capability.

Rule ID

SV-276549r1139169_rule

STIG

Samsung Android 16 COBO Security Technical Implementation Guide

Version

V1R3

CCIs

CCI-002536

Discussion

Ad hoc wireless client-to-client connections allow mobile devices to communicate with each other directly, circumventing network security policies and making the traffic invisible. This could allow the exposure of sensitive DOD data and increase the risk of downloading and installing malware of the DOD mobile device. SFR ID: FMT_SMF_EXT.1.1/WLAN

Check Content

Review the configuration to determine if the Samsung Android devices are disallowing Wi-Fi Direct.

This validation procedure is performed on both the management tool and the Samsung Android device.

On the management tool, in the user restrictions, verify "Wi-Fi Direct" has been set to "Disallow".

On the Samsung Android device:
1. Open Settings >> Connections >> Wi-Fi.
2. From the hamburger menu, select Wi-Fi Direct.
3. Verify that Wi-Fi Direct cannot be selected.

If on the management tool "Wi-Fi Direct" is not set to "Disallow", or on the Samsung Android device a Wi-Fi direct device is listed that can be connected to, this is a finding.

Fix Text

Configure the Samsung Android devices to disallow Wi-Fi Direct.

On the management tool, in the user restrictions, set "Wi-Fi Direct" to "Disallow".

Wi-Fi direct connections and pairing between devices will become unavailable.

API: addUserRestriction, DISALLOW_WIFI_DIRECT