STIGQter STIGQter: STIG Summary: Windows 10 Security Technical Implementation Guide Version: 2 Release: 2 Benchmark Date: 04 May 2021:

The Windows 10 system must use an anti-virus program.

DISA Rule

SV-220707r569187_rule

Vulnerability Number

V-220707

Group Title

SRG-OS-000480-GPOS-00227

Rule Version

WN10-00-000045

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

If no anti-virus software is in use, install Windows Defender or a third-party anti-virus solution.

Check Contents

Verify an anti-virus solution is installed on the system and in use. The anti-virus solution may be bundled with an approved host-based security solution.

Verify if Windows Defender is in use or enabled:

Open "PowerShell".

Enter “get-service | where {$_.DisplayName -Like "*Defender*"} | Select Status,DisplayName”

Verify third-party antivirus is in use or enabled:

Open "PowerShell".

Enter “get-service | where {$_.DisplayName -Like "*mcafee*"} | Select Status,DisplayName”

Enter “get-service | where {$_.DisplayName -Like "*symantec*"} | Select Status,DisplayName”

If there is no anti-virus solution installed on the system, this is a finding.

Vulnerability Number

V-220707

Documentable

False

Rule Version

WN10-00-000045

Severity Override Guidance

Verify an anti-virus solution is installed on the system and in use. The anti-virus solution may be bundled with an approved host-based security solution.

Verify if Windows Defender is in use or enabled:

Open "PowerShell".

Enter “get-service | where {$_.DisplayName -Like "*Defender*"} | Select Status,DisplayName”

Verify third-party antivirus is in use or enabled:

Open "PowerShell".

Enter “get-service | where {$_.DisplayName -Like "*mcafee*"} | Select Status,DisplayName”

Enter “get-service | where {$_.DisplayName -Like "*symantec*"} | Select Status,DisplayName”

If there is no anti-virus solution installed on the system, this is a finding.

Check Content Reference

M

Target Key

4072

Comments