McAfee VSEL 1.9/2.0 STIG Version 1, Release 1 Checklist Details (Checklist Revisions)

Supporting Resources:


Target CPE Name
McAfee VirusScan Enterprise for Linux 1.9x cpe:/a:mcafee:virusscan_enterprise_for_linux:1.9x (View CVEs)
McAfee VirusScan Enterprise for Linux 2.0x cpe:/a:mcafee:virusscan_enterprise_for_linux:2.0x (View CVEs)

Checklist Highlights

Checklist Name:
McAfee VSEL 1.9/2.0 STIG
Checklist ID:
Version 1, Release 1
Review Status:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:

Checklist Summary:

This document is a requirement for all DoD-administered Linux systems and all Linux systems connected to DoD networks. These requirements are designed to assist Security Managers (SMs), Information Security System Managers (ISSMs), Information Security System Officers (ISSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts. This McAfee VSEL 1.9x/2.0x Managed Client Security Technical Implementation Guide (STIG) provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system or otherwise annoying or disrupting the victim. Malware has become the most significant external threat to most systems, causing widespread damage and disruption and necessitating extensive recovery efforts within most organizations. Spyware’s intention is to violate a user’s privacy and has become a major concern to organizations. Although privacy violating malware has been in use for many years, it has become much more widespread recently, with spyware invading many systems to monitor personal activities and conduct financial fraud. Organizations also face similar threats from a few forms of non-malware threats that are often associated with malware. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Another common form is virus hoaxes, which are false warnings of new malware threats. These requirements address several major forms of malware, including viruses, worms, Trojan horses, malicious mobile code, blended attacks, spyware tracking cookies, and attacker tools, such as backdoors and root kits. The McAfee VSEL 1.9x/2.0x can be configured directly on each local system or via the ePolicy Orchestrator (ePO) to all managed clients. This STIG gives technology-specific information for the McAfee VSEL Managed Client system.

Checklist Role:

  • Antivirus Software

Known Issues:

Not Provided

Target Audience:

Not Provided

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not Provided

Regulatory Compliance:

DoDI 8500.01


Not Provided


Not Provided

Product Support:

Not Provided

Point of Contact:


Not Provided


Not Provided

Change History:

1/27/2016 Promote to Final
4/27/2016 - version 1 release 2
moved to FINAL - 6/7/2016
Updated URL to reflect change to the DISA website - http --> https
Updated - 11/01/2017
Updated to FINAL - 11/27/2017
corrected resource title - 1/24/2018
updated to v1, r4 - 4/30/2019
Updated URLs - 6/6/19
Updated URLs - 6/14/19
Updated URLs per DISA - 4/24/2020
updated URLs per DISA - 4/29/2020
sunset per DISA - 10/07/2021


URL Description


Reference URL Description

NIST checklist record last modified on 10/07/2021