Check: GEN006640
Solaris 9 X86 STIG:
GEN006640
(in version v1 r9)
Title
The system must use and update a DoD-approved virus scan program. (Cat II impact)
Discussion
Virus scanning software can be used to protect a system from penetration from computer viruses and to limit their spread through intermediate systems. Virus scanning software is available to DoD on the JTF-GNO web site. The virus scanning software should be configured to perform scans dynamically on accessed files. If this capability is not available, the system must be configured to scan, at a minimum, all altered files on the system on a daily basis. If the system processes inbound SMTP mail, the virus scanner must be configured to scan all received mail.
Check Content
Check for the existence of the McAfee command line scan tool to be executed daily in the cron file. Additional tools specific for each operating system are also available and will have to be manually reviewed if installed. In addition, the definitions file should not be older than seven (7) days. Check if uvscan is scheduled to run. # grep uvscan /var/spool/cron/crontabs/* Perform the following command to ensure the virus definition signature files are not older than seven (7) days. # ls -la clean.dat names.dat scan.dat If a virus scanner is not being run daily or the virus definitions are older than seven (7) days, this is a finding.
Fix Text
Install McAfee command line virus scan tool, or an appropriate alternative from https://www.jtfgno.mil. Ensure the virus signature definition files are no older than seven (7) days. Updates are also available from https://www.jtfgno.mil. Ensure the command line virus scan tool is run on a regular basis using a utility, such as cron.
Additional Identifiers
Rule ID: SV-28461r3_rule
Vulnerability ID: V-12765
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
CCI-001668 |
The organization employs malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means or inserted through the exploitation of information system vulnerabilities. |
Controls
Number | Title |
---|---|
No controls are assigned to this check |