DTAM150 - McAfee VirusScan Access Protection: Anti-Virus Standard Protection must be set to prevent mass mailing worms from sending mail.

Information

Many viruses and worms find email addresses on the infected system and send themselves to these addresses. They do this by connecting directly to the email servers whose names they have harvested from the local system. This rule prevents any process from talking to a foreign email server using SMTP. By blocking this communication, a machine may become infected with a new mass mailing virus, but that virus will be unable to spread further by email. It prevents outbound access to SMTP ports 25 and 587 on all programs except known email clients listed as an exclusion.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

From the ePO server console System Tree, select the Systems tab, select the asset to be checked, select Actions, select Agent, and select Modify Policies on a Single System. From the product pull down list, select VirusScan Enterprise 8.8.0. Select the policy associated with the Access Protection Policies. Under the Access Protection tab, locate the 'Access protection rules:' label. In the 'Categories' box, select 'Anti-Virus Standard Protection'. Select both 'Prevent mass mailing worms from sending email' (Block and Report) options. Select Save.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_McAfee_VirusScan88_Managed_Client_V5R21_STIG.zip

Item Details

References: CAT|II, CCI|CCI-001170, Rule-ID|SV-55256r2_rule, STIG-ID|DTAM150, Vuln-ID|V-42528

Plugin: Windows

Control ID: ecc7c5f683b73c368625a216a4cd2b2518ce3fe66d388241207c01882045e533