Symantec Endpoint Protection 12.1 Local Client STIG Version 1, Release 3 Checklist Details (Checklist Revisions)
NOTE
This is not the current revision of this Checklist, view the current revision.
Supporting Resources:
-
Download Standalone XCCDF 1.1.4 - Symantec Endpoint Protection 12.1 Local Client STIG - Version 1, Release 3
- Defense Information Systems Agency
Target:
Target | CPE Name |
---|---|
Symantec Endpoint Protection 12.1 | cpe:/a:symantec:endpoint_protection:12.1 (View CVEs) |
Checklist Highlights
- Checklist Name:
- Symantec Endpoint Protection 12.1 Local Client STIG
- Checklist ID:
- 604
- Version:
- Version 1, Release 3
- Type:
- Compliance
- Review Status:
- Archived
- Authority:
- Governmental Authority: Defense Information Systems Agency
- Original Publication Date:
- 08/13/2015
Checklist Summary:
networks. These requirements are designed to assist Security Managers (SMs), Information Security System Managers (ISSMs), Information Security System Officers (ISSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts. This McAfee Antivirus STIG provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Malware has become the most significant external threat to most systems, causing widespread damage and disruption, and necessitating extensive recovery efforts within most organizations. Spyware malware's intention is to violate a user’s privacy and has become a major concern to organizations. Although privacy violating malware has been in use for many years, it has become much more widespread recently, with spyware invading many systems to monitor personal activities and conduct financial fraud. Organizations also face similar threats from a few forms of non-malware threats that are often associated with malware. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Another common form is virus hoaxes, which are false warnings of new malware threats. These requirements address several major forms of malware, including viruses, worms, Trojan horses, malicious mobile code, blended attacks, spyware tracking cookies, and attacker tools, such as backdoors and root kits. The Symantec Endpoint Protection 12.1 Antivirus can be configured directly on each local client or via the Symantec Endpoint Protection Management Server to all managed clients. This STIG gives technology-specific information for the Symantec Enpoint Protection 12.1 Antivirus Locally Configured.
Checklist Role:
- Antivirus Software
Known Issues:
Not Provided
Target Audience:
DoDI 8500.01
Target Operational Environment:
- Managed
- Specialized Security-Limited Functionality (SSLF)
Testing Information:
Not Provided
Regulatory Compliance:
DoD Directive (DoDD) 8500.1
Comments/Warnings/Miscellaneous:
Not Provided
Disclaimer:
Not Provided
Product Support:
Not Provided
Point of Contact:
Sponsor:
Not Provided
Licensing:
Not Provided
Change History:
Changed status from "under review" to "final" - 14 September 2015 archived - 05/19/2017 null Updated URL to reflect change to the DISA website - http --> https
Dependency/Requirements:
URL | Description |
---|
References:
Reference URL | Description |
---|