DTAM091 - McAfee VirusScan On-Access General Policies must be configured to block the connection when a threatened file is detected in a shared folder.


Containment during a virus outbreak is crucial. Infected hosts may attempt to spread malware and will use every network path available to them when spreading that infection. By containing the system when a detection is found, the malware will be restricted to that one system. Likewise, if malware is detected in a shared folder, maintaining the connection between a system and the shared folder would allow the malware to spread. Placing temporary restrictions on network connectivity is an effective mitigation mechanism.

These block connection settings will most often be used on a server housing shared folders and files, and will block the connection from any network user on a remote computer who attempts to read from, or write to, a threatened file in the shared folder. In addition, it will block the connection from any user on a remote computer who attempts to write an unwanted program to the computer. The connection will be unblocked after the specified amount of time, re-allowing access to the other shared files and folders, but will be re-blocked should those same file accesses be attempted.


From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Policies on a Single System. From the product pull down list, select VirusScan Enterprise 8.8.0. Select from the Policy column the policy associated with the On-Access General Policies. Under the Blocking tab, locate the 'Block the connection:' label. Select the 'Block the connection when a threatened file is detected in a shared folder' option. Select Save.

See Also


Item Details


References: 800-53|SI-3c.1., CAT|II, CCI|CCI-001242, Rule-ID|SV-216928r397870_rule, STIG-ID|DTAM091, STIG-Legacy|SV-55217, STIG-Legacy|V-14619, Vuln-ID|V-216928

Plugin: Windows

Control ID: 1b43f6336f6f5818c31bb661559d051a3d6d9a1836a6c5ff5b5aa0127c4fb2c7