STIGQter STIGQter: STIG Summary: McAfee VSEL 1.9/2.0 Local Client Security Technical Implementation Guide Version: 1 Release: 5 Benchmark Date: 25 Oct 2019: Access to the McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x Web UI must be enforced by firewall rules.

DISA Rule

SV-77635r1_rule

Vulnerability Number

V-63145

Group Title

SRG-APP-000380

Rule Version

DTAVSEL-301

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure a host-based firewall or network-based firewall with rules to restrict access to the McAfee VSEL Web UI, limiting access to specific IP addresses of System Administrators only.

Check Contents

With the System Administrator's assistance, review the host-based firewall for rules to the McAfee VSEL Web UI's TCP/IP port.

If the host-based firewall does not have rules to restrict access to the McAfee VSEL Web UI, limiting access to specific IP addresses of System Administrators only, determine if the network-based firewall provides for that restriction.

If neither a host-based firewall nor a network-based firewall restricts access to the McAfee VSEL Web UI, this is a finding.

Vulnerability Number

V-63145

Documentable

False

Rule Version

DTAVSEL-301

Severity Override Guidance

With the System Administrator's assistance, review the host-based firewall for rules to the McAfee VSEL Web UI's TCP/IP port.

If the host-based firewall does not have rules to restrict access to the McAfee VSEL Web UI, limiting access to specific IP addresses of System Administrators only, determine if the network-based firewall provides for that restriction.

If neither a host-based firewall nor a network-based firewall restricts access to the McAfee VSEL Web UI, this is a finding.

Check Content Reference

M

Target Key

2941

Comments