STIGQter STIGQter: STIG Summary: McAfee VirusScan 8.8 Managed Client STIG Version: 5 Release: 21 Benchmark Date: 25 Oct 2019:

McAfee VirusScan On-Demand scan must be scheduled to be executed at least on a weekly basis.

DISA Rule

SV-55213r3_rule

Vulnerability Number

V-6627

Group Title

DTAM070-McAfee VirusScan schedule

Rule Version

DTAM070

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Tasks on a Single System. From the list of available tasks in the Task Name column, with the assistance of the ePO SA, identify the weekly on demand client scan task. In the same row as the client scan task under review, under the Task Type column, ensure it is an "On Demand scan" and in the Status column, ensure that the status is "Enabled". Select "Edit Assignment" in the Actions column. In the Task to Schedule: area, verify the Product is "VirusScan Enterprise 8.8.0" and the Task Type is "On Demand Scan". Select the schedule page. Locate the "Schedule type:" label. For the pull down menu, select "Weekly". Select Save.

Check Contents

From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Tasks on a Single System. From the list of available tasks in the Task Name column, with the assistance of the ePO SA, identify the weekly on demand client scan task. In the same row as the client scan task under review, under the Task Type column, ensure it is an "On Demand scan" and in the Status column, ensure that the status is "Enabled". Select "Edit Assignment" in the Actions column. In the Task to Schedule: area, verify the Product is "VirusScan Enterprise 8.8.0" and the Task Type is "On Demand Scan". Select the Summary tab. Locate the "Schedule:" label. Ensure the Status is "Enabled" and that the Type is at least "Weekly".

Criteria: If the Scheduled Status: is "Enabled" and the Schedule Type: is at least "Weekly", this is not a finding.

Locally, on the client machine, use the Windows Explorer to navigate to the following folder: (This folder may be hidden.)
%SystemDrive%\ProgramData\McAfee\Common Framework\Task (64-Bit)

If folder(s) do not exist, an alternative method of validating is via the following registry key:
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\McAfee\DesktopProtection\Tasks] and are referenced by a GUID for each task.

Multiple .ini files will be stored in this folder, one for each task defined on the ePO server for this client. The name for each task is identified in the first section of the file under the [Task] section on the TaskName= "" line. Additionally, a TaskType= line is provided to describe the type of scan. In this case, TaskType=VSC700_Scan_Task is expected. Information for this check is determined by examining the contents of this file.

Criteria: If [Settings] Enabled=1 and [Schedule] Type=0 the schedule is daily, this is not a finding.
If [Settings] Enabled=1 and [Schedule] Type=1 the schedule is weekly, this is not a finding.

Vulnerability Number

V-6627

Documentable

False

Rule Version

DTAM070

Severity Override Guidance

From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Tasks on a Single System. From the list of available tasks in the Task Name column, with the assistance of the ePO SA, identify the weekly on demand client scan task. In the same row as the client scan task under review, under the Task Type column, ensure it is an "On Demand scan" and in the Status column, ensure that the status is "Enabled". Select "Edit Assignment" in the Actions column. In the Task to Schedule: area, verify the Product is "VirusScan Enterprise 8.8.0" and the Task Type is "On Demand Scan". Select the Summary tab. Locate the "Schedule:" label. Ensure the Status is "Enabled" and that the Type is at least "Weekly".

Criteria: If the Scheduled Status: is "Enabled" and the Schedule Type: is at least "Weekly", this is not a finding.

Locally, on the client machine, use the Windows Explorer to navigate to the following folder: (This folder may be hidden.)
%SystemDrive%\ProgramData\McAfee\Common Framework\Task (64-Bit)

If folder(s) do not exist, an alternative method of validating is via the following registry key:
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\McAfee\DesktopProtection\Tasks] and are referenced by a GUID for each task.

Multiple .ini files will be stored in this folder, one for each task defined on the ePO server for this client. The name for each task is identified in the first section of the file under the [Task] section on the TaskName= "" line. Additionally, a TaskType= line is provided to describe the type of scan. In this case, TaskType=VSC700_Scan_Task is expected. Information for this check is determined by examining the contents of this file.

Criteria: If [Settings] Enabled=1 and [Schedule] Type=0 the schedule is daily, this is not a finding.
If [Settings] Enabled=1 and [Schedule] Type=1 the schedule is weekly, this is not a finding.

Check Content Reference

M

Responsibility

System Administrator

Target Key

2266

Comments