MS.TEAMS.7.2v1 - Users SHOULD be prevented from opening or downloading files detected as malware.

Information

Teams can be used as a mechanism for delivering malware. In many cases, malware can be detected through scanning, reducing the risk for end users.

NOTE: Nessus has provided the target output to assist in reviewing the benchmark to ensure target compliance.

Solution

Any product meeting the requirements outlined in this baseline policy may be used. If the agency uses Microsoft Defender, see the following implementation steps for [Safe Attachments](https://github.com/cisagov/ScubaGear/tree/v1.5.0/PowerShell/ScubaGear/baselines/defender.md#implementation-2) for additional guidance.

See Also

https://github.com/cisagov/ScubaGear/tree/v1.5.0/

Item Details

Category: ACCESS CONTROL, SECURITY ASSESSMENT AND AUTHORIZATION, CONFIGURATION MANAGEMENT, SYSTEM AND COMMUNICATIONS PROTECTION, SYSTEM AND INFORMATION INTEGRITY

References: 800-53|AC-4, 800-53|CA-7, 800-53|CM-2, 800-53|CM-6, 800-53|CM-7, 800-53|SC-7, 800-53|SC-44, 800-53|SI-3, 800-53|SI-4, 800-53|SI-7, 800-53|SI-8, 800-53|SI-10

Plugin: microsoft_azure

Control ID: 9533bd8c034e0d6b50768144b1047f3b6deb7db7101b83f760c09384ebc9c369