Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000181-IDPS-000168 | SRG-NET-000181-IDPS-000168 | SRG-NET-000181-IDPS-000168_rule | Medium |
Description |
---|
The goal of running vulnerability assessment scans is to identify devices on your network that are open to known vulnerabilities. Malicious software such as Trojan horses, hacker tools, DDoS (Distributed Denial of Service) agents, and spyware can establish a management console on individual desktops and servers. Many of these are not detected by anti-virus software or even host intrusion detection systems. Without the detection and prevention of malicious software, unauthorized users may gain access to sensitive data by assuming the identity of authorized users. |
STIG | Date |
---|---|
IDPS Security Requirements Guide (SRG) | 2012-03-08 |
Check Text ( C-43308_chk ) |
---|
Verify the use of signatures or rules that monitor for unauthorized software. If IDPS signatures are not used to monitor the network, this is a finding. |
Fix Text (F-43308_fix) |
---|
Configure the IDPS sensors to detect unauthorized software. |