DTAVSEL-107 - The McAfee VirusScan Enterprise for Linux 1.9.x/2.0.x On-Demand scanner must be configured to Move infected files to the quarantine directory if first action fails when a virus or Trojan is detected.

Information

Malware may have infected a file that is necessary to the user. By configuring the anti-virus software to first attempt cleaning the infected file, availability to the file is not sacrificed. If a cleaning attempt is not successful, however, deleting the file is the only safe option to ensure the malware is not introduced onto the system or network.

Solution

From the ePO server console System Tree, select 'My Organization'. Select the 'Systems' tab. To show all systems in the System Tree, select 'This Group and All Subgroups' from the 'Preset:' drop-down list.

From the list of systems, locate the asset representing the Linux system being reviewed. Click on the system to open the System Information page.

If a task does not exist for the regularly scheduled weekly scan, create a New Client Task to run an On Demand scan at least weekly.

Click on Actions >> Agent >> Modify Tasks on a Single System.

From the list of available tasks in the 'Task Name' column, with the assistance of the ePO SA, identify the weekly On Demand scan client task.

For the designated weekly On Demand scan client task, verify the 'Task Type' is listed as 'On Demand Scan'.
Under the 'Task Name' column, click on the link for the designated task to review the task properties.
In the 'Actions' tab, under the 'When Viruses and Trojans are found:', next to 'If the above action fails:', select the radio button for 'Move infected files to the quarantine directory'.
Populate the 'Quarantine Directory:' field with '/quarantine' (or another valid location as determined by the organization).

Click 'Save'.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_McAfee_VSEL_1-9_2-0_Y20M04_STIG.zip

Item Details

Category: SYSTEM AND INFORMATION INTEGRITY

References: 800-53|SI-3c.1., CAT|II, CCI|CCI-001241, Rule-ID|SV-77537r1_rule, STIG-ID|DTAVSEL-107, Vuln-ID|V-63047

Plugin: Unix

Control ID: 5f36bd0667c2dc24975ab84fe7bd766c99207b7067a70fbbf05b5e1d9a61d97d