Information
This policy setting ensures that the system must use an anti-virus program.
Rationale:
Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this type of software will aid in elimination of the software from the operating system.
Impact:
Anti-virus software must be installed on the system.
NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.
Solution
If no anti-virus software is in use, install Windows Defender or third-party anti-virus.
Open PowerShell
Type Install-WindowsFeature -Name Windows-Defender
For third-party anti-virus, install per anti-virus instructions and disable Windows Defender.
Open PowerShell
Type Uninstall-WindowsFeature -Name Windows-Defender
Default Value:
Windows defender - Enabled
Additional Information:
Microsoft Windows Server 2019 Security Technical Implementation Guide:
Version 2, Release 1, Benchmark Date: November 13, 2020
Vul ID: V-205850
Rule ID: SV-205850r569245_rule
STIG ID: WN19-00-000110
Severity: CAT I