STIGQter STIGQter: STIG Summary: McAfee VirusScan 8.8 Local Client STIG Version: 5 Release: 16 Benchmark Date: 27 Jul 2018: McAfee VirusScan On-Demand scan must be configured to detect for unwanted programs.

DISA Rule

SV-56416r1_rule

Vulnerability Number

V-14654

Group Title

DTAM058-McAfee VirusScan check unwanted programs

Rule Version

DTAM058

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Access the local VirusScan console by clicking Start->All Programs->McAfee->VirusScan Console.
In the console window, under Task, with the assistance of the System Administrator, identify the weekly on-demand client scan task.
Right-click the Task and select Properties.

Under the Scan Items tab, locate the "Options:" label. Select the "Detect unwanted programs" option.


Click OK to Save.

Check Contents

Access the local VirusScan console by clicking Start->All Programs->McAfee->VirusScan Console.
In the console window, under Task, with the assistance of the System Administrator, identify the weekly on-demand client scan task.
Right-click the Task and select Properties.

Under the Scan Items tab, locate the "Options:" label. Ensure the "Detect unwanted programs" option is selected.

Criteria: If "Detect unwanted programs" option is selected, this is not a finding.

On the client machine, use the Windows Registry Editor to navigate to the following key:
HKLM\Software\McAfee\ (32-bit)
HKLM\Software\Wow6432Node\McAfee\ (64-bit)
DesktopProtection\Tasks

Under the DesktopProtection\Tasks, and with the assistance of the System Administrator, review each GUID key's szTaskName to find the GUID key associated with weekly on-demand client scan task.

Criteria: If, under the applicable GUID key, the ApplyNVP has a value of 0, this is a finding.

Vulnerability Number

V-14654

Documentable

False

Rule Version

DTAM058

Severity Override Guidance

Access the local VirusScan console by clicking Start->All Programs->McAfee->VirusScan Console.
In the console window, under Task, with the assistance of the System Administrator, identify the weekly on-demand client scan task.
Right-click the Task and select Properties.

Under the Scan Items tab, locate the "Options:" label. Ensure the "Detect unwanted programs" option is selected.

Criteria: If "Detect unwanted programs" option is selected, this is not a finding.

On the client machine, use the Windows Registry Editor to navigate to the following key:
HKLM\Software\McAfee\ (32-bit)
HKLM\Software\Wow6432Node\McAfee\ (64-bit)
DesktopProtection\Tasks

Under the DesktopProtection\Tasks, and with the assistance of the System Administrator, review each GUID key's szTaskName to find the GUID key associated with weekly on-demand client scan task.

Criteria: If, under the applicable GUID key, the ApplyNVP has a value of 0, this is a finding.

Check Content Reference

M

Responsibility

Information Assurance Officer

Target Key

605

Comments