STIGQter STIGQter: STIG Summary: Trend Micro Deep Security 9.x Security Technical Implementation Guide Version: 1 Release: 1 Benchmark Date: 26 Feb 2016:

Trend Deep Security must automatically audit account enabling actions.

DISA Rule

SV-80447r1_rule

Vulnerability Number

V-65957

Group Title

SRG-APP-000319

Rule Version

TMDS-00-000245

Severity

CAT II

CCI(s)

Weight

10

Fix Recommendation

Configure the Trend Deep Security server to automatically audit account enabling actions.

1. Configure Events and Alerts to notify the SA and ISSO using the Administration >> System Settings >> Alerts tab. Inset a distribution email address into the “Alert Event Forwarding (From The Manager).” The distribution email address must be configured within Exchange or other email server and must associate the SA and ISSO accounts reviewing and/or managing the system.

2. Configure the alert using the Administration >> System Settings >> System Events for “User Created” Event ID 650. Select the options for “Record” and “Forward”.

Check Contents

Review the Trend Deep Security server configuration to ensure account enabling actions are automatically audited.

1. Analyze the system using the Administration >> System Settings >> Alerts. Review the email address listed in the “Alert Event Forwarding (From The Manager).”

If this email address is not present or does not belong to a distribution for system administrators and ISSOs, this is a finding.

2. Analyze the system using the Administration >> System Settings >> System Events for “User Created” Event ID 650.

If the options for “Record” and “Forward” are not enabled for "User Created", this is a finding.

Vulnerability Number

V-65957

Documentable

False

Rule Version

TMDS-00-000245

Severity Override Guidance

Review the Trend Deep Security server configuration to ensure account enabling actions are automatically audited.

1. Analyze the system using the Administration >> System Settings >> Alerts. Review the email address listed in the “Alert Event Forwarding (From The Manager).”

If this email address is not present or does not belong to a distribution for system administrators and ISSOs, this is a finding.

2. Analyze the system using the Administration >> System Settings >> System Events for “User Created” Event ID 650.

If the options for “Record” and “Forward” are not enabled for "User Created", this is a finding.

Check Content Reference

M

Target Key

2955

Comments