DTAVSEL-012 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Access scanner must only be configured with exclusions which are documented and approved by the ISSO/ISSM/AO.

Information

When scanning for malware, excluding specific files will increase the risk of a malware-infected file going undetected. By configuring anti-virus software without any exclusions, the scanner has a higher success rate at detecting and eradicating malware.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

From the ePO server console System Tree, select 'My Organization'. Select the 'Systems' tab. To show all systems in the System Tree, select 'This Group and All Subgroups' from the 'Preset:' drop-down list.

From the list of systems, locate the asset representing the Linux system being reviewed. Click on the system to open the System Information page.

Click on Actions >> Agent >> Modify Policies on a Single System.

From the 'Product:' drop-down list, select 'VirusScan Enterprise for Linux 1.9.x/2.0.x'.

From the 'Policy' column, click on the policy for the 'On-Access Scanning Policy'.

In the 'Detections' tab, next to 'What not to scan:', verify the only entries for the 'Select files and directories to be excluded from virus scanning' field are those below:

Under 'Paths Excluded From Scanning', remove all entries other than the below listed of approved exclusions. Any additional required exclusions must be documented by the System Administrator and approved by the ISSO/ISSM.

/var/log
/_admin/Manage_NSS
/mnt/system/log
/media/nss/.*/(._NETWARE|._ADMIN)
/.*.(vmdk|VMDK|dbl|DBL|ctl|CTL|log|LOG|jar|JAR|war|WAR|dtx|DTX|dbf|DBF|frm|
FRM|myd|MYD|myi|MYI|rdo|RDO|arc|ARC)
/cgroup
/dev
/proc
/selinux
/sys

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_McAfee_VSEL_1-9_2-0_Y20M04_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3c.2., CAT|II, CCI|CCI-001243, Rule-ID|SV-77507r2_rule, STIG-ID|DTAVSEL-012, Vuln-ID|V-63017

Plugin: Unix

Control ID: e837a903f5c8eed8662b5af1319c6cb36ec394aa7139966b5a6b65e11c5ba684