Symantec Endpoint Protection 12.1 Local Client STIG Version 1, Release 3 Checklist Details (Checklist Revisions)

Supporting Resources:

Target:

Target CPE Name
Symantec Endpoint Protection 12.1 cpe:/a:symantec:endpoint_protection:12.1 (View CVEs)

Checklist Highlights

Checklist Name:
Symantec Endpoint Protection 12.1 Local Client STIG
Checklist ID:
604
Version:
Version 1, Release 3
Type:
Compliance
Review Status:
Archived
Authority:
Governmental Authority: Defense Information Systems Agency
Original Publication Date:
08/13/2015

Checklist Summary:

networks. These requirements are designed to assist Security Managers (SMs), Information Security System Managers (ISSMs), Information Security System Officers (ISSOs), and System Administrators (SAs) with configuring and maintaining security controls. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts. This McAfee Antivirus STIG provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. Malware has become the most significant external threat to most systems, causing widespread damage and disruption, and necessitating extensive recovery efforts within most organizations. Spyware malware's intention is to violate a user’s privacy and has become a major concern to organizations. Although privacy violating malware has been in use for many years, it has become much more widespread recently, with spyware invading many systems to monitor personal activities and conduct financial fraud. Organizations also face similar threats from a few forms of non-malware threats that are often associated with malware. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Another common form is virus hoaxes, which are false warnings of new malware threats. These requirements address several major forms of malware, including viruses, worms, Trojan horses, malicious mobile code, blended attacks, spyware tracking cookies, and attacker tools, such as backdoors and root kits. The Symantec Endpoint Protection 12.1 Antivirus can be configured directly on each local client or via the Symantec Endpoint Protection Management Server to all managed clients. This STIG gives technology-specific information for the Symantec Enpoint Protection 12.1 Antivirus Locally Configured.

Checklist Role:

  • Antivirus Software

Known Issues:

Not Provided

Target Audience:

DoDI 8500.01

Target Operational Environment:

  • Managed
  • Specialized Security-Limited Functionality (SSLF)

Testing Information:

Not Provided

Regulatory Compliance:

DoD Directive (DoDD) 8500.1

Comments/Warnings/Miscellaneous:

Not Provided

Disclaimer:

Not Provided

Product Support:

Not Provided

Point of Contact:

disa.stig_spt@mail.mil.

Sponsor:

Not Provided

Licensing:

Not Provided

Change History:

Changed status from "under review" to "final" - 14 September 2015
archived - 05/19/2017
null
Updated URL to reflect change to the DISA website - http --> https
Updated URLs - 6/14/19
updated URLs - 9/11/19

Dependency/Requirements:

URL Description

References:

Reference URL Description

NIST checklist record last modified on 09/11/2019