InformationThe operating system must have virus scanning software installed.
Virus scanning software can be used to protect a system from penetration from computer viruses and to limit their spread through intermediate systems.
The virus scanning software should be configured to perform scans dynamically on accessed files. If this capability is not available, the system must be configured to scan, at a minimum, all altered files on the system on a daily basis.
If the system processes inbound SMTP mail, the virus scanner must be configured to scan all received mail.
NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.
SolutionInstall an antivirus solution on the system.
Document which solution is installed on the system with the ISSO.
This Benchmark recommendation maps to:
Red Hat Enterprise Linux 7 Security Technical Implementation Guide:
Version 2, Release: 3 Benchmark Date: 26 Apr 2019
Vul ID: V-72213
Rule ID: SV-86837r3_rule
STIG ID: RHEL-07-032000
Severity: CAT I