69.7 (L1) Ensure 'Infrared monitor service (irmon)' is set to 'Disabled' or 'Not Installed'

Information

Detects other Infrared devices that are in range and launches the file transfer application.

The recommended state for this setting is: Disabled or Not Installed

Infrared connections can potentially be a source of data compromise - especially via the automatic 'file transfer application' functionality. Enterprise-managed systems should utilize a more secure method of connection than infrared.

Solution

To establish the recommended configuration, set the following Custom Configuration Policy to 4 or confirm that the service is Not installed :

Name: <Enter name>
Description: <Enter Description>
OMA-URI: ./Device/Vendor/MSFT/Policy/Config/SystemServices/ConfigureInfraredMonitorServiceStartupMode
Data Type: Integer
Value: 4

Note: As of January 2024, despite its inclusion in Microsoft's official documentation, using an OMI-URI to configure a Windows Service Startup Mode via a custom profile will lead to an error in Intune. This error will be logged in the local event log as 'The system cannot find the file specified.' Currently, the most reliable method for remediation is through PowerShell.

The recommended configuration can also be established via PowerShell by running the following cmdlet:

Set-Service -Name irmon -StartupType Disabled

Impact:

Infrared file transfers will be prevented from working.

See Also

https://workbench.cisecurity.org/benchmarks/16853

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6, 800-53|CM-7, CSCv7|9.2

Plugin: Windows

Control ID: ae9d913cba9c9278307c2a926d25f25e1889d61c7281ff4a5f6eda56cf88d288