DTAM148 - McAfee VirusScan Access Protection: Anti-Spyware Maximum Protection must be set to block and log execution of scripts from the Temp folder.

Information

This rule prevents the Windows scripting host from running VBScript and JavaScript scripts from the Temp directory. This would protect against a large number of trojans and questionable web installation mechanisms that are used by many adware and spyware applications.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Policies on a Single System. From the product pull down list, select VirusScan Enterprise 8.8.0. Select the policy associated with the Access Protection Policies.

Under the Access Protection tab, locate the 'Access protection rules:' label. In the 'Categories' box, select 'Anti-Spyware Maximum Protection'.

Select the 'Prevent execution of scripts from the Temp folder' (Block and Report) option.

Select Save.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_McAfee_VirusScan88_Managed_Client_V6R1_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3c.2., CAT|II, CCI|CCI-001243, Rule-ID|SV-216958r397873_rule, STIG-ID|DTAM148, STIG-Legacy|SV-55254, STIG-Legacy|V-42526, Vuln-ID|V-216958

Plugin: Windows

Control ID: c5a52d3d37dbc1e5fc8e3ada25f3a6eb66bc6538b565d3c2a4c964c011209800