rmfdb
McAfee MOVE AV Multi-Platform 4.5 Security Technical Implementation Guide - Version 1, Release 2

This Security Technical Implementation Guide is published as a tool to improve the security of Department of Defense (DoD) information systems. The requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.

Released 2018-07-27 (7 years ago)
Loading...
SV-93215r1_rule (V-78509) - The McAfee MOVE AV Common Options policy must be configured to report all events to the Windows Event Log.
Group TitleMV45-COP-000001
Severity medium
DiscussionForensic identification is the practice of identifying infected hosts by looking for evidence of recent infections. The evidence may be very recent (only a few minutes old) or not so recent (hours or days old); the older the information is, the less accurate it is likely to be. The most obvious sources of evidence are those that are designed to identify malware activity, such as anti-virus software, content filtering (e.g., anti-spam measures), IPS, and SIEM technologies. The logs of security applications might contain detailed records of suspicious activity and might also indicate whether a security compromise occurred or was prevented.
CCIs
CCI-001489
Check Content
Fix Text
SV-93217r1_rule (V-78511) - The McAfee MOVE AV Common Options policy must be configured to send all events to the HBSS ePO server.
Group TitleMV45-COP-000002
Severity medium
DiscussionForensic identification is the practice of identifying infected hosts by looking for evidence of recent infections. The evidence may be very recent (only a few minutes old) or not so recent (hours or days old); the older the information is, the less accurate it is likely to be. The most obvious sources of evidence are those that are designed to identify malware activity, such as anti-virus software, content filtering (e.g., anti-spam measures), IPS, and SIEM technologies. The logs of security applications might contain detailed records of suspicious activity and might also indicate whether a security compromise occurred or was prevented.
CCIs
CCI-001489
Check Content
Fix Text
SV-93219r1_rule (V-78513) - The McAfee MOVE AV Common Options policy must be configured to not rotate log files until they reach at least 10 MB in size.
Group TitleMV45-COP-000003
Severity medium
DiscussionForensic identification is the practice of identifying infected hosts by looking for evidence of recent infections. The evidence may be very recent (only a few minutes old) or not so recent (hours or days old); the older the information is, the less accurate it is likely to be. The most obvious sources of evidence are those that are designed to identify malware activity, such as anti-virus software, content filtering (e.g., anti-spam measures), IPS, and SIEM technologies. The logs of security applications might contain detailed records of suspicious activity and might also indicate whether a security compromise occurred or was prevented. While logging is imperative to forensic analysis, logs could grow to the point of impacting disk space on the system. To avoid the risk of logs growing to the size of impacting the operating system, the log size and number of log files will be restricted but must be large enough to retain forensic value.
CCIs
CCI-001489
Check Content
Fix Text
SV-93221r1_rule (V-78515) - The McAfee MOVE AV Common Options policy must be configured to enable self-protection.
Group TitleMV45-COP-000004
Severity high
DiscussionThe self-protection feature defends files, services, and registry keys on virtual machines and will ensure uninterrupted protection. Self-protection on the McAfee MOVE SVM is provided by the SVM's VirusScan Enterprise Access Protection configuration. The self-protection feature is controlled by the IntegrityEnabled configuration parameter. By default, the parameter is set to "0x7", and all components of the feature are enabled.
CCIs
CCI-001242
Check Content
Fix Text
SV-93223r1_rule (V-78517) - All other anti-virus products must be removed from the virtual machine while the McAfee AV Client is running.
Group TitleMV45-GEN-000001
Severity medium
DiscussionOrganizations should deploy anti-virus software on all hosts for which satisfactory anti-virus software is available. Anti-virus software should be installed as soon after operating system installation as possible and then updated with the latest anti-virus software patches (to eliminate any known vulnerabilities in the anti-virus software itself). To support the security of the host, the anti-virus software should be configured and maintained properly so it continues to be effective at detecting and stopping malware. McAfee MOVE AV Client will not function properly with other anti-virus products installed.
CCIs
CCI-000381
Check Content
Fix Text
SV-93225r1_rule (V-78519) - The McAfee MOVE AV policies must be configured with and managed by the HBSS ePO server.
Group TitleMV45-GEN-000002
Severity medium
DiscussionOrganizations should use centrally managed anti-virus software that is controlled and monitored regularly by anti-virus administrators, who are also typically responsible for acquiring, testing, approving, and delivering anti-virus signature and software updates throughout the organization. Users should not be able to disable or delete anti-virus software from their hosts, nor should they be able to alter critical settings. Anti-virus administrators should perform continuous monitoring to confirm that hosts are using current anti-virus software and that the software is configured properly. Implementing all of these recommendations should strongly support an organization in having a strong and consistent anti-virus deployment across the organization.
CCIs
CCI-001242
Check Content
Fix Text
SV-93227r1_rule (V-78521) - The admin password for the McAfee MOVE AV Security Virtual Machine (SVM) must be changed from the default.
Group TitleMV45-GEN-000003
Severity high
DiscussionThe preconfigured Security Virtual Appliance (SVA) comes with a default password for the "SVAadmin" account. This account has root privileges to the Linux operating system of the appliance. By not changing the password from the default, the appliance will be subject to access by unauthorized individuals.
CCIs
CCI-002418
Check Content
Fix Text
SV-93229r1_rule (V-78523) - The McAfee VirusScan Enterprise Access Protection rules must be used for self-protection of the files and folder of the McAfee Security Virtual Manager (SVM).
Group TitleMV45-GEN-000004
Severity high
DiscussionThe VirusScan Enterprise Access Protection rules will defend files, services, and registry keys on the McAfee Security Virtual Manager (SVM).
CCIs
CCI-001242
Check Content
Fix Text
SV-93231r1_rule (V-78525) - The McAfee MOVE AV On Access Scan Policy must be configured to enable protection.
Group TitleMV45-OAS-000001
Severity high
DiscussionAnti-virus software should be installed as soon after operating system installation as possible and then updated with the latest signatures and anti-virus software patches (to eliminate any known vulnerabilities in the anti-virus software itself). The anti-virus software should then perform a complete scan of the host to identify any potential infections. To support the security of the host, the anti-virus software should be configured and maintained properly so it continues to be effective at detecting and stopping malware. Anti-virus software is most effective when its signatures are fully up to date. Accordingly, antivirus software should be kept current with the latest signature and software updates to improve malware detection.
CCIs
CCI-001242
Check Content
Fix Text
SV-93233r1_rule (V-78527) - The McAfee MOVE AV On Access Scan Policy must be configured with a scan timeout of 45 seconds or more.
Group TitleMV45-OAS-000002
Severity medium
DiscussionThis setting configures the amount of time, in seconds, to wait for a scan to complete. The default setting is 45 seconds. This is the duration for which a McAfee MOVE AV Agent will wait for scan response of a file from the Security Virtual Machine (SVM). Typically, file scans are very fast. However, file scans may take longer due to large file size, file type, or heavy load on the SVM. If the file scan takes longer than the scan timeout limit, the file access is allowed and a scan timeout event is generated. Setting the timeout too low may result in scans of a file terminating before the scan is completed, resulting in malware potentially going undetected.
CCIs
CCI-001242
Check Content
Fix Text
SV-93235r1_rule (V-78529) - The McAfee MOVE AV On Access Scan Policy must be configured to cache scan results for files smaller than 40 MB.
Group TitleMV45-OAS-000003
Severity medium
DiscussionThis setting configures the maximum file size (in MB) up to which scan results should be cached. The default setting is 40 MB. Files smaller than this threshold are copied completely to the Security Virtual Machine (SVM) and scanned. If the file is found to be clean, its scan result is cached based on its SHA 1 checksum for faster future access. Files larger than this size threshold are transferred in chunks that are requested by the SVM and scanned. Setting that threshold higher could impact the performance of the scan processes.
CCIs
CCI-001242
Check Content
Fix Text
SV-93237r1_rule (V-78531) - The McAfee MOVE AV On Access Scan Policy must be configured to scan when writing to disk.
Group TitleMV45-OAS-000004
Severity medium
DiscussionAnti-virus software is the most commonly used technical control for malware threat mitigation. Real-time scanning of files as they are written to disk is a crucial first line of defense from malware attacks.
CCIs
CCI-001242
Check Content
Fix Text
SV-93239r1_rule (V-78533) - The McAfee MOVE AV On Access Scan Policy must be configured to scan when reading from disk.
Group TitleMV45-OAS-000005
Severity medium
DiscussionAnti-virus software is the most commonly used technical control for malware threat mitigation. Real-time scanning of files as they are read from disk is a crucial first line of defense from malware attacks.
CCIs
CCI-001242
Check Content
Fix Text
SV-93241r1_rule (V-78535) - The McAfee MOVE AV On Access Scan Policy must be configured to scan all file types.
Group TitleMV45-OAS-000006
Severity medium
DiscussionWhen scanning for malware, excluding specific file types will increase the risk of a malware-infected file going undetected. By configuring anti-virus software to scan all file types, the scanner has a higher success rate at detecting and eradicating malware.
CCIs
CCI-001242
Check Content
Fix Text
SV-93243r1_rule (V-78537) - Path or file exclusions configured in McAfee MOVE AV On Access Scan Policy must be formally documented by the System Administrator and approved by the ISSO/ISSM.
Group TitleMV45-OAS-000007
Severity medium
DiscussionWhen scanning for malware, excluding specific file types will increase the risk of a malware-infected file going undetected. By configuring anti-virus software to scan all file types, the scanner has a higher success rate at detecting and eradicating malware. Excluding files, paths, and processes from being scanned expands the potential for malware to be allowed onto the information system. While it is recognized that some file types might need to be excluded for operational reasons and/or because there is protection afforded to those files through a different mechanism, allowing those exclusions should always be vetted, documented, and approved before applying.
CCIs
CCI-000366
Check Content
Fix Text
SV-93245r1_rule (V-78539) - Process exclusions configured in McAfee MOVE AV On Access Scan Policy must be formally documented by the System Administrator and approved by the ISSO/ISSM.
Group TitleMV45-OAS-000008
Severity medium
DiscussionWhen scanning for malware, excluding specific file types will increase the risk of a malware-infected file going undetected. By configuring anti-virus software to scan all file types, the scanner has a higher success rate at detecting and eradicating malware. Excluding files, paths, and processes from being scanned expands the potential for malware to be allowed onto the information system. While it is recognized that some file types might need to be excluded for operational reasons and/or because there is protection afforded to those files through a different mechanism, allowing those exclusions should always be vetted, documented, and approved before applying.
CCIs
CCI-000366
Check Content
Fix Text
SV-93247r1_rule (V-78541) - The McAfee MOVE AV On Access Scan policy must be configured to delete files automatically and quarantine as the first response of a threat detection.
Group TitleMV45-OAS-000009
Severity medium
DiscussionMalware incident containment has two major components: stopping the spread of malware and preventing further damage to hosts. Disinfecting a file is generally preferable to quarantining it because the malware is removed and the original file restored; however, many infected files cannot be disinfected. The primary goal of eradication is to remove malware from infected hosts.
CCIs
CCI-001242
Check Content
Fix Text
SV-93249r1_rule (V-78543) - The McAfee MOVE AV On Demand Scan policy must be configured to enable on-demand scan.
Group TitleMV45-ODS-000001
Severity medium
DiscussionAnti-virus software is the most commonly used technical control for malware threat mitigation. Anti-virus software on hosts should be configured to scan all hard drives and folders regularly to identify any file system infections and to scan any removable media, if applicable, before media is inserted into the system. Not scheduling a regular scan of the hard drives of a system and/or not configuring the scan to scan all files and running processes introduces a higher risk of threats going undetected.
CCIs
CCI-001241
Check Content
Fix Text
SV-93251r1_rule (V-78545) - The McAfee MOVE AV On Demand Scan policy must be configured to enforce a maximum time for each file scan of no less than 45 seconds.
Group TitleMV45-ODS-000002
Severity medium
DiscussionThis setting configures the amount of time, in seconds, to wait for a scan to complete. The default setting is 45 seconds. This is the duration for which a McAfee MOVE AV Agent will wait for scan response of a file from the Security Virtual Machine (SVM). Typically, file scans are very fast. However, file scans may take longer due to large file size, file type, or heavy load on the SVM. If the file scan takes longer than the scan timeout limit, the file access is allowed and a scan timeout event is generated. Setting the timeout too low may result in scans of a file terminating before the scan is completed, resulting in malware potentially going undetected.
CCIs
CCI-001241
Check Content
Fix Text
SV-93253r1_rule (V-78547) - The McAfee MOVE AV On Demand Scan policy must be explicitly configured to stop an on-demand scan after an organization-specific period.
Group TitleMV45-ODS-000003
Severity medium
DiscussionThis setting configures the maximum time, in minutes, for on-demand scanning. The default setting is 150 minutes. Typically, file scans are very fast. However, file scans may take longer due to large file size, file type, or heavy load on the Security Virtual Machine (SVM). For cases where an on-demand scan will take longer, an organization should determine the maximum amount of time for its on-demand scanning and explicitly configure this setting.
CCIs
CCI-001241
Check Content
Fix Text
SV-93255r1_rule (V-78549) - The McAfee MOVE AV On Demand Scan policy must be configured to cache scan results for files smaller than 40 MB.
Group TitleMV45-ODS-000004
Severity medium
DiscussionThis setting configures the maximum file size (in MB) up to which scan results should be cached. The default setting is 40 MB. Files smaller than this threshold are copied completely to the Security Virtual Machine (SVM) and scanned. If the file is found to be clean, its scan result is cached based on its SHA 1 checksum for faster future access. Files larger than this size threshold are transferred in chunks that are requested by the SVM and scanned. Setting that threshold higher could impact the performance of the scan processes.
CCIs
CCI-001241
Check Content
Fix Text
SV-93257r1_rule (V-78551) - The McAfee MOVE AV On Demand Scan policy must be configured to delete files automatically and quarantine as the first response of a threat detection.
Group TitleMV45-ODS-000005
Severity medium
DiscussionMalware incident containment has two major components: stopping the spread of malware and preventing further damage to hosts. Disinfecting a file is generally preferable to quarantining it because the malware is removed and the original file restored; however, many infected files cannot be disinfected. The primary goal of eradication is to remove malware from infected hosts. Deleting files found to contain malware, while also moving them to quarantine, will allow the files to be rendered useless but are recoverable in the event of false positive.
CCIs
CCI-001241
Check Content
Fix Text
SV-93259r1_rule (V-78553) - The McAfee MOVE AV On Demand Scan policy must be configured to scan all file types.
Group TitleMV45-ODS-000006
Severity medium
DiscussionWhen scanning for malware, excluding specific file types will increase the risk of a malware-infected file going undetected. By configuring anti-virus software to scan all file types, the scanner has a higher success rate at detecting and eradicating malware.
CCIs
CCI-001241
Check Content
Fix Text
SV-93261r1_rule (V-78555) - Path Exclusions configured in the McAfee MOVE AV On Demand Scan policy must be formally documented by the System Administrator and approved by the ISSO/ISSM.
Group TitleMV45-ODS-000007
Severity medium
DiscussionWhen scanning for malware, excluding specific file types will increase the risk of a malware-infected file going undetected. By configuring anti-virus software to scan all file types, the scanner has a higher success rate at detecting and eradicating malware. Excluding files, paths, and processes from being scanned expands the potential for malware to be allowed onto the information system. While it is recognized that some file types might need to be excluded for operational reasons and/or because there is protection afforded to those files through a different mechanism, allowing those exclusions should always be vetted, documented, and approved before applying.
CCIs
CCI-001241
Check Content
Fix Text
SV-93263r1_rule (V-78557) - The McAfee MOVE AV On-Demand Scan interval must be set to no more than every seven days.
Group TitleMV45-ODS-000008
Severity medium
DiscussionAnti-virus software is the most commonly used technical control for malware threat mitigation. Anti-virus software on hosts should be configured to scan all hard drives and folders regularly to identify any file system infections and to scan any removable media, if applicable, before media is inserted into the system. Not scheduling a regular scan of the hard drives of a system and/or not configuring the scan to scan all files and running processes introduces a higher risk of threats going undetected.
CCIs
CCI-001241
Check Content
Fix Text
SV-93265r2_rule (V-78559) - The McAfee MOVE AV Options Policy must be configured with the location of quarantine to ensure consistency across all systems.
Group TitleMV45-OPT-000001
Severity medium
DiscussionThe quarantine on each system represents a potential danger should the files contained within the quarantine be executed inadvertently. To centrally manage the quarantine on all systems, the quarantine should always be configured the same across all systems, which will allow management to better control access to those locations.
CCIs
CCI-001242
Check Content
Fix Text
SV-93267r1_rule (V-78561) - The McAfee MOVE AV Options Policy must be configured to automatically delete quarantined data after a time period of no more than 28 days.
Group TitleMV45-OPT-000002
Severity medium
DiscussionThe quarantine on each system represents a potential danger should the files contained within the quarantine be executed inadvertently. Deleting the quarantine contents on a regular basis will alleviate the ability of malware from being executed. An organization's incident response policy should also contain steps in removing quarantined items after their forensic value has been depleted.
CCIs
CCI-001242
Check Content
Fix Text
SV-93269r1_rule (V-78563) - The McAfee MOVE AV SVM Settings policy ODS scan interval must be set to no more than every seven days.
Group TitleMV45-SVM-000001
Severity medium
DiscussionAnti-virus software is the mostly commonly used technical control for malware threat mitigation. Anti-virus software on hosts should be configured to scan all hard drives and folders regularly to identify any file system infections and to scan any removable media, if applicable, before media is inserted into the system. Not scheduling a regular scan of the hard drives of a system and/or not configuring the scan to scan all files and running processes introduces a higher risk of threats going undetected.
CCIs
CCI-001241
Check Content
Fix Text
SV-93271r1_rule (V-78565) - The McAfee MOVE AV SVM must have McAfee VirusScan Enterprise installed.
Group TitleMV45-SVM-000002
Severity medium
DiscussionOrganizations should deploy anti-virus software on all hosts for which satisfactory anti-virus software is available. Anti-virus software should be installed as soon after OS installation as possible and then updated with the latest signatures and anti-virus software patches (to eliminate any known vulnerabilities in the anti-virus software itself). To support the security of the host, the anti-virus software should be configured and maintained properly so it continues to be effective at detecting and stopping malware. Anti-virus software is most effective when its signatures are fully up to date. Accordingly, anti-virus software should be kept current with the latest signature and software updates to improve malware detection.
CCIs
CCI-002605
Check Content
Fix Text
SV-93273r1_rule (V-78567) - The McAfee MOVE AV SVM must be managed by the HBSS ePO server.
Group TitleMV45-SVM-000003
Severity medium
DiscussionOrganizations should use centrally managed anti-virus software that is controlled and monitored regularly by anti-virus administrators, who are also typically responsible for acquiring, testing, approving, and delivering anti-virus signature and software updates throughout the organization. Users should not be able to disable or delete anti-virus software from their hosts, nor should they be able to alter critical settings. Anti-virus administrators should perform continuous monitoring to confirm that hosts are using current anti-virus software and that the software is configured properly. Implementing all of these recommendations should strongly support an organization in having a strong and consistent anti-virus deployment across the organization.
CCIs
CCI-000366
Check Content
Fix Text
SV-93275r1_rule (V-78569) - The McAfee MOVE AV SVM must be configured with a static Internet Protocol (IP) address.
Group TitleMV45-SVM-000004
Severity medium
DiscussionSecurity management devices must be configured to ensure consistent and uninterrupted connectivity to/from the systems they manage/control. Otherwise, the security management device will be less than effective.
CCIs
CCI-000366
Check Content
Fix Text
SV-93277r1_rule (V-78571) - The McAfee MOVE AV SVM Settings policy must be configured to scan for potentially unwanted programs.
Group TitleMV45-SVM-000005
Severity medium
DiscussionDue to the ability of malware to mutate after infection, standard anti-virus signatures may not be able to catch new strains or variants of the malware. Typically, these strains and variants will share unique characteristics with others in their virus family. By using a generic signature to detect the shared characteristics, using wildcards where differences lie, the generic signature can detect viruses even if they are padded with extra, meaningless code. This method of detection is heuristic detection.
CCIs
CCI-001242
Check Content
Fix Text
SV-93279r1_rule (V-78573) - The McAfee MOVE AV SVM Settings policy must be configured to scan for Multipurpose Internet Mail Extensions (MIME)-encoded files.
Group TitleMV45-SVM-000006
Severity medium
DiscussionMultipurpose Internet Mail Extensions (MIME) encoded files can be crafted to hide a malicious payload. When the MIME encoded file is presented to software that decodes the MIME encoded files, such as an email client, the malware is released. Scanning these files as part of the regularly scheduled scans tasks will mitigate this risk.
CCIs
CCI-001242
Check Content
Fix Text
SV-93281r1_rule (V-78575) - The McAfee MOVE AV SVM Settings policy must be configured to use McAfee Global Threat Intelligence file reputation with a sensitivity level of medium or higher.
Group TitleMV45-SVM-000007
Severity medium
DiscussionAnti-virus software vendors use collective intelligence from sensors and cross-vector intelligence from web, email, and network threats to compile scores that reflect the likelihood of whether a file in question is malware. The collective intelligence is constantly being updated, more frequently than the typical daily anti-virus signature files. With File Reputation lookup, a more real-time response to potential malicious code is realized than with the local-running anti-virus software, since by querying the cloud-based database when a file appears to be suspicious, up-to-the-minute intelligence is provided. This type of protection reduces the threat protection time period from days to milliseconds, increases malware detection rates, and reduces downtime and remediation costs associated with malware attacks. Using File Reputation lookup is mandated by USCYBERCOM on DoD systems.
CCIs
CCI-001242
Check Content
Fix Text