STIGQter STIGQter: STIG Summary: Symantec ProxySG ALG Security Technical Implementation Guide Version: 1 Release: 3 Benchmark Date: 24 Apr 2020:

Symantec ProxySG providing content filtering must continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions.

DISA Rule

SV-104297r1_rule

Vulnerability Number

V-94343

Group Title

SRG-NET-000391-ALG-000140

Rule Version

SYMP-AG-000650

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure proxy services.

1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Review each service specified in the list with the ProxySG administrator to ensure that all remote access traffic has been accounted for and add any that are missing per the ProxySG Administration Guide, Chapter 7: Managing Proxy Services.
4. Click Configuration >> Policy >> Visual Policy Manager >> Launch.
5. Click each layer and right-click the "Source" and "Destination" fields for each rule. Select "Set" and set each to the organizationally defined values in accordance with the site's SSP.

Check Contents

Determine what proxy services are enabled on the ProxySG.

1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Review each service specified in the list with the ProxySG administrator to verify that all remote access traffic has been accounted for.
4. Click Configuration >> Policy >> Visual Policy Manager >> Launch.
5. Click each layer and Verify that the "Source" and "Destination" fields for each rule are set to the organizationally defined sources and destinations.

If Symantec ProxySG providing content filtering does not continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions, this is a finding.

Vulnerability Number

V-94343

Documentable

False

Rule Version

SYMP-AG-000650

Severity Override Guidance

Determine what proxy services are enabled on the ProxySG.

1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Review each service specified in the list with the ProxySG administrator to verify that all remote access traffic has been accounted for.
4. Click Configuration >> Policy >> Visual Policy Manager >> Launch.
5. Click each layer and Verify that the "Source" and "Destination" fields for each rule are set to the organizationally defined sources and destinations.

If Symantec ProxySG providing content filtering does not continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions, this is a finding.

Check Content Reference

M

Target Key

3515

Comments