STIGQter STIGQter: STIG Summary: McAfee Application Control 8.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

The organization-specific Rules policy must only include executable and dll files that are associated with applications as allowed by the organizations written policy.

DISA Rule

SV-213329r506897_rule

Vulnerability Number

V-213329

Group Title

SRG-APP-000386

Rule Version

MCAC-TE-000103

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Obtain the organization's written policy for the McAfee Application Control software from the System or ePO Administrator.

From the ePO server console System Tree, select the "Systems" tab.

Select "This Group and All Subgroups".
Select the asset.
Select "Actions".
Select "Agent".
Select "Modify Policies on a Single System".

From the product pull-down list, select Solidcore 8.x: Application Control.

Remove any "Rules Groups" and/or applications under the "Rules Groups" that do not comply with the organization's written policy.

If applications are required, follow the formal change and acceptance process to document the applications in the organization's written policy.

Check Contents

Obtain the organization's written policy for the McAfee Application Control software from the System or ePO Administrator.

From the ePO server console System Tree, select the "Systems" tab.

Select "This Group and All Subgroups".

Select the asset(s) that need the organization-specific policy.

Note: The organization specific rules policy is for additional allowed applications. In the event there are McAfee Default rules that need to be excluded in an organization or on a specific asset, a copy of the McAfee Default must be used in place of the McAfee Default rules policy. In that copy, only the specific rules should be removed that the organization wants to deny.

Select "Actions".

Select "Agent".

Select "Modify Policies on a Single System".

From the product pull-down list, select "Solidcore 8.x: Application Control".

For the "Application Control Rules (Windows)" Category, click on "Edit Assignments" under the "Actions" column.

Identify the organization-specific Rules policy applied to the system being reviewed.

Click on "Edit Policy" beside the organization-specific Rules policy.

Verify the list of applications under each of the "Rules Groups" in the organization-specific Rules policy against the written policy's list of allowed applications.

If the organization-specific Rules policy contains any applications not documented in the written policy as allowed, this is a finding.

Vulnerability Number

V-213329

Documentable

False

Rule Version

MCAC-TE-000103

Severity Override Guidance

Obtain the organization's written policy for the McAfee Application Control software from the System or ePO Administrator.

From the ePO server console System Tree, select the "Systems" tab.

Select "This Group and All Subgroups".

Select the asset(s) that need the organization-specific policy.

Note: The organization specific rules policy is for additional allowed applications. In the event there are McAfee Default rules that need to be excluded in an organization or on a specific asset, a copy of the McAfee Default must be used in place of the McAfee Default rules policy. In that copy, only the specific rules should be removed that the organization wants to deny.

Select "Actions".

Select "Agent".

Select "Modify Policies on a Single System".

From the product pull-down list, select "Solidcore 8.x: Application Control".

For the "Application Control Rules (Windows)" Category, click on "Edit Assignments" under the "Actions" column.

Identify the organization-specific Rules policy applied to the system being reviewed.

Click on "Edit Policy" beside the organization-specific Rules policy.

Verify the list of applications under each of the "Rules Groups" in the organization-specific Rules policy against the written policy's list of allowed applications.

If the organization-specific Rules policy contains any applications not documented in the written policy as allowed, this is a finding.

Check Content Reference

M

Target Key

3982

Comments