STIGQter STIGQter: STIG Summary: McAfee Application Control 8.x Security Technical Implementation Guide Version: 2 Release: 1 Benchmark Date: 23 Oct 2020:

A copy of the McAfee Default Rules policy must be part of the effective rules policy applied to every endpoint.

DISA Rule

SV-213343r506897_rule

Vulnerability Number

V-213343

Group Title

SRG-APP-000386

Rule Version

MCAC-TE-000118

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the ePO server console System Tree, select the "Systems" tab.

Select "This Group and All Subgroups".
Select the asset.
Select "Actions".
Select "Agent".
Select "Modify Policies on a Single System".

From the product pull-down list, select Solidcore 8.x: Application Control.

For the "Application Control Rules (Windows)" Category, click on "Edit Assignments" under the "Actions" column.

Click on the "New Policy Instance" button at the bottom of the screen.

Scroll down to locate the new policy instance just created. Click on the drop-down selection box for "Assigned policy:" and choose "McAfee Default)".

Select the "Locked (prevent breaking inheritance below this point)" radio button.

Click "Save".

Check Contents

This requirement is only applicable to Windows platforms. For MAC and Linux platforms, this is Not Applicable.

From the ePO server console System Tree, select the "Systems" tab.

Select "This Group and All Subgroups".

Select the asset to be validated.

Select "Actions".

Select "Agent".

Select "Modify Policies on a Single System".

From the product pull-down list, select Solidcore 8.x: Application Control.

For the "Application Control Rules (Windows)" Category, click on "Edit Assignments" under the "Actions" column.

Verify that a Rules policy copied from the McAfee Default Rules policy is part of the assigned policies applied to the system being reviewed.

If a Rules policy copied from the McAfee Default Rules policy is not part of the assigned policies applied to the system being reviewed, this is a finding.

Vulnerability Number

V-213343

Documentable

False

Rule Version

MCAC-TE-000118

Severity Override Guidance

This requirement is only applicable to Windows platforms. For MAC and Linux platforms, this is Not Applicable.

From the ePO server console System Tree, select the "Systems" tab.

Select "This Group and All Subgroups".

Select the asset to be validated.

Select "Actions".

Select "Agent".

Select "Modify Policies on a Single System".

From the product pull-down list, select Solidcore 8.x: Application Control.

For the "Application Control Rules (Windows)" Category, click on "Edit Assignments" under the "Actions" column.

Verify that a Rules policy copied from the McAfee Default Rules policy is part of the assigned policies applied to the system being reviewed.

If a Rules policy copied from the McAfee Default Rules policy is not part of the assigned policies applied to the system being reviewed, this is a finding.

Check Content Reference

M

Target Key

3982

Comments