UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must use and update a DoD-approved virus scan program.


Overview

Finding ID Version Rule ID IA Controls Severity
V-12765 GEN006640 SV-35224r1_rule ECVP-1 Medium
Description
Virus scanning software can be used to protect a system from penetration from computer viruses and to limit their spread through intermediate systems. Virus scanning software is available to DoD on the JTF-GNO website (https://www.jtfgno.mil). The virus scanning software should be configured to perform scans dynamically on accessed files. If this capability is not available, the system must be configured to scan, at a minimum, all altered files on the system on a daily basis. If the system processes inbound SMTP mail, the virus scanner must be configured to scan all received mail.
STIG Date
HP-UX 11.23 Security Technical Implementation Guide 2012-05-25

Details

Check Text ( C-36734r1_chk )
Check for the existence of the McAfee command line scan tool to be executed weekly in the cron file. Additional tools specific for each operating system are also available and will have to be manually reviewed if they are installed. In addition, the definitions file should not be older than 14 days.

Check if uvscan scheduled to run.
# grep uvscan /var/spool/cron/crontabs/*

If a virus scanner is not being run weekly this is a finding.

If a virus scanner is being run at least weekly, ensure the virus definition signature files are not older than 14 days.
# find / -type f -name clean.dat -o -name names.dat -o -name scan.dat | xargs -n1 ls -lLa

If the virus definitions are older than 14 days, this is a finding.
Fix Text (F-32115r1_fix)
Install McAfee command line virus scan tool, or an appropriate alternative from https://www.jtfgno.mil. Ensure the virus signature definition files are no older than 14 days. Updates are also available from https://www.jtfgno.mil.