STIGQter STIGQter: STIG Summary: Trend Micro Deep Security 9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 26 Feb 2016:

Trend Deep Security must manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

DISA Rule

SV-80425r1_rule

Vulnerability Number

V-65935

Group Title

SRG-APP-000247

Rule Version

TMDS-00-000190

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Trend Deep Security server to manage excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of Denial of Service (DoS) attacks.

Configure the “CPU Usage Level” in accordance with the SA best practice under Administration >> System Settings >> Advanced >> CPU Usage During Recommendation Scans.

Check Contents

Review the Trend Deep Security server configuration to ensure excess capacity, bandwidth, or other redundancy is managed to limit the effects of information flooding types of Denial of Service (DoS) attacks.

Review the “CPU Usage Level” under Administration >> System Settings >> Advanced >> CPU Usage During Recommendation Scans.

Depending on resource capabilities for monitored agent scans, it may be necessary to limit the “CPU Usage Level” from High to Low.

If the setting is not configured in accordance with the SA best practice recommendation this is a finding.

Vulnerability Number

V-65935

Documentable

False

Rule Version

TMDS-00-000190

Severity Override Guidance

Review the Trend Deep Security server configuration to ensure excess capacity, bandwidth, or other redundancy is managed to limit the effects of information flooding types of Denial of Service (DoS) attacks.

Review the “CPU Usage Level” under Administration >> System Settings >> Advanced >> CPU Usage During Recommendation Scans.

Depending on resource capabilities for monitored agent scans, it may be necessary to limit the “CPU Usage Level” from High to Low.

If the setting is not configured in accordance with the SA best practice recommendation this is a finding.

Check Content Reference

M

Target Key

2955

Comments