STIGQter STIGQter: STIG Summary: Windows 10 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

Wi-Fi Sense must be disabled.

DISA Rule

SV-220808r569187_rule

Vulnerability Number

V-220808

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN10-CC-000065

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the policy value for Computer Configuration >> Administrative Templates >> Network >> WLAN Service >> WLAN Settings>> "Allow Windows to automatically connect to suggested open hotspots, to networks shared by contacts, and to hotspots offering paid services" to "Disabled".

v1507 LTSB does not include this group policy setting. It may be configured through other means such as using group policy from a later version of Windows 10 or a registry update.

Check Contents

This is NA as of v1803 of Windows 10; Wi-Fi sense is no longer available.

If the following registry value does not exist or is not configured as specified, this is a finding.

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config\

Value Name: AutoConnectAllowedOEM

Type: REG_DWORD
Value: 0x00000000 (0)

Vulnerability Number

V-220808

Documentable

False

Rule Version

WN10-CC-000065

Severity Override Guidance

This is NA as of v1803 of Windows 10; Wi-Fi sense is no longer available.

If the following registry value does not exist or is not configured as specified, this is a finding.

Registry Hive: HKEY_LOCAL_MACHINE
Registry Path: \SOFTWARE\Microsoft\WcmSvc\wifinetworkmanager\config\

Value Name: AutoConnectAllowedOEM

Type: REG_DWORD
Value: 0x00000000 (0)

Check Content Reference

M

Target Key

4072

Comments