Check: TIDX-SV-000004
Trellix TIE/DXL STIG:
TIDX-SV-000004
(in versions v3 r1 through v2 r3)
Title
The Trellix Threat Intelligence Exchange (TIE) Server Management Global Threat Intelligence (GTI) Reputations must be enabled to get file reputation from the Trellix GTI. (Cat I impact)
Discussion
This setting dictates whether to use the Trellix GTI to get file reputation. Trellix GTI is used if the TIE server does not have reputation information for a file or if the TIE server is unavailable.
Check Content
This check must be completed for the active Trellix TIE Server Management policy that manages the site Trellix TIE. For TIE servers on the SIPRNet or classified network, GTI must be disabled; therefore this requirement is Not Applicable. From the ePO server console, select the Policy Catalog tab. From the Policy Catalog, select the Trellix TIE Server Management from Products. Under "Actions", select Edit for the policy that manages the site Trellix TIE. Select the "Trellix Global Threat Intelligence" tab. For "GTI Reputation", verify the check box for "Enabled" is selected. If the check box for "Enabled" is not selected, this is a finding.
Fix Text
From the ePO server console, select the Policy Catalog tab. From the Policy Catalog, select the Trellix TIE Server Management from Products. Under "Actions", select Edit for the policy that manages the site Trellix TIE. Select the "Trellix Global Threat Intelligence" tab. For "GTI Reputation", select the check box for "Enabled". Click Save.
Additional Identifiers
Rule ID: SV-222000r1015916_rule
Vulnerability ID: V-222000
Group Title: SRG-APP-000278
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001242 |
The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy. |
CCI-002624 |
Configure malicious code protection mechanisms to perform real-time scans of files from external sources at endpoint; and/or network entry and exit points as the files are downloaded, opened, or executed in accordance with organizational policy. |
Controls
Number | Title |
---|---|
SI-3 |
Malicious Code Protection |