STIGQter STIGQter: STIG Summary: McAfee VSEL 1.9/2.0 Managed Client Security Technical Implementation Guide Version: 1 Release: 4 Benchmark Date: 26 Apr 2019: The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x must be configured to enable On-Access scanning.

DISA Rule

SV-77489r1_rule

Vulnerability Number

V-62999

Group Title

SRG-APP-000279

Rule Version

DTAVSEL-003

Severity

CAT I

CCI(s)

Weight

10

Fix Recommendation

From the ePO server console System Tree, select "My Organization". Select the "Systems" tab. To show all systems in the System Tree, select "This Group and All Subgroups" from the "Preset:" drop-down list.

From the list of systems, locate the asset representing the Linux system being reviewed. Click on the system to open the System Information page.

Click on Actions >> Agent >> Modify Policies on a Single System.

From the "Product:" drop-down list, select "VirusScan Enterprise for Linux 1.9.x/2.0.x". From the "Policy" column, click on the policy for the "On-Access Scanning Policy".

In the "General" tab, next to the "On-access Scan:", select the check box for "Enable on-access scanning (takes effect when policies are enforced)".

In the "Quarantine Directory:" field, enter "/quarantine" (or another valid location as determined by the organization).

Check Contents

From the ePO server console System Tree, select "My Organization". Select the "Systems" tab. To show all systems in the System Tree, select "This Group and All Subgroups" from the "Preset:" drop-down list.

From the list of systems, locate the asset representing the Linux system being reviewed. Click on the system to open the System Information page.

Click on Actions >> Agent >> Modify Policies on a Single System.

From the "Product:" drop-down list, select "VirusScan Enterprise for Linux 1.9.x/2.0.x". From the "Policy" column, click on the policy for the "On-Access Scanning Policy".

In the "General" tab, next to the "On-access Scan:", verify the check box for "Enable on-access scanning (takes effect when policies are enforced)" is selected.

Verify the "Quarantine Directory:" field is populated with "/quarantine" (or another valid location as determined by the organization).

If the check box for "Enable on-access scanning (takes effect when policies are enforced)" is not selected, this is a finding.

If the "Quarantine Directory:" field is not populated, this is a finding.

Vulnerability Number

V-62999

Documentable

False

Rule Version

DTAVSEL-003

Severity Override Guidance

From the ePO server console System Tree, select "My Organization". Select the "Systems" tab. To show all systems in the System Tree, select "This Group and All Subgroups" from the "Preset:" drop-down list.

From the list of systems, locate the asset representing the Linux system being reviewed. Click on the system to open the System Information page.

Click on Actions >> Agent >> Modify Policies on a Single System.

From the "Product:" drop-down list, select "VirusScan Enterprise for Linux 1.9.x/2.0.x". From the "Policy" column, click on the policy for the "On-Access Scanning Policy".

In the "General" tab, next to the "On-access Scan:", verify the check box for "Enable on-access scanning (takes effect when policies are enforced)" is selected.

Verify the "Quarantine Directory:" field is populated with "/quarantine" (or another valid location as determined by the organization).

If the check box for "Enable on-access scanning (takes effect when policies are enforced)" is not selected, this is a finding.

If the "Quarantine Directory:" field is not populated, this is a finding.

Check Content Reference

M

Target Key

2939

Comments