Skip to content
macOSNetworkMedium

macOS Bluetooth plist

System Bluetooth configuration plist records paired devices with their MAC address, display name, device type, and last seen / last connected timestamps.

artifact_type: macos_bluetooth

Where to find it

Default filesystem paths and registry locations. Collect these with your preferred live-response or disk-image tooling.

  • $/Library/Preferences/com.apple.Bluetooth.plist

Forensic significance

Common scenarios in which this artifact becomes decisive evidence.

  • Identifying a suspect's personal device near a compromised host
  • Data exfiltration via Bluetooth file transfer
  • Physical-proximity correlation with device owner

MITRE ATT&CK mapping

Techniques this artifact can help detect or substantiate. Click a technique to view the official MITRE entry.

Tools that parse it

unJaena AI and other DFIR tools commonly used to extract evidence from this artifact.

unJaena AI
plistutil
mac_apt

Related artifacts

Stop parsing artifacts by hand

unJaena AI ingests disk images, live-response output, and mobile backups, then automatically correlates every artifact on this page — and 200+ more — into an investigator-ready timeline.

Try unJaena AI