STIGhubSTIGhub
STIGsSearchCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 5 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Zebra Technologies Android 14 COBO Security Technical Implementation Guide

V-283551

CAT III (Low)

Zebra Android 14 must allow only the administrator (MDM) to perform the following management function: Disable Phone Hub.

Rule ID

SV-283551r1190064_rule

STIG

Zebra Technologies Android 14 COBO Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001090

Discussion

It may be possible to transfer work profile data on a DOD Android device to an unauthorized Chromebook if the user has the same Zebra account set up on the Chromebook and in the work profile on the Android device. This could result in the exposure of sensitive DOD data. SFR ID: FMT_MOF_EXT.1.2 #47

Check Content

Review the EMM configuration to confirm Phone Hub has been disabled.

On the management tool:

1. Open "Nearby notification streaming policy".
2. Verify "Nearby notification streaming policy" is set to "Disabled".
3. Open "Nearby app streaming policy".
4. Verify "Nearby app streaming policy" is set to "Disabled".

If on the management tool the "Nearby Streaming Policy" is not set to "Disabled" and "Nearby app streaming policy" is not set to "Disabled", this is a finding.

Note: From a Chromebook, if a device is connected to the Phone Hub, try to set up the Notifications. It will fail to connect to the device to complete the setup if Phone Hub has been disabled on the DOD Android device.

Fix Text

Configure the Zebra Android 14 device to disable the nearby notification streaming policy to disable Phone Hub.

COPE and COBO:

On the EMM console:

1. Open "Nearby notification streaming policy".
2. Set "Nearby notification streaming policy" to "Disabled".
3. Open "Nearby app streaming policy".
4. Set "Nearby app streaming policy" to "Disabled".