UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SC-35 HONEYCLIENTS


Overview

Number Title Impact Priority Subject Area
SC-35 Honeyclients P0 System And Communications Protection

Instructions
The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
Guidance
Honeyclients differ from honeypots in that the components actively probe the Internet in search of malicious code (e.g., worms) contained on external websites. As with honeypots, honeyclients require some supporting isolation measures (e.g., virtualization) to ensure that any malicious code discovered during the search and subsequently executed does not infect organizational information systems.

Enhancements