UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must employ automated mechanisms or must have an application installed that, on an organization defined frequency, determines the state of information system components with regard to flaw remediation.


Overview

Finding ID Version Rule ID IA Controls Severity
WN12-GE-000023 WN12-GE-000023 WN12-GE-000023_rule Medium
Description
Organizations are required to identify information systems containing software affected by recently announced software flaws (and potential vulnerabilities resulting from those flaws) and report this information to designated organizational officials with information security responsibilities (e.g., senior information security officers, information system security managers, information systems security officers). To support this requirement, an automated process or mechanism is required.
STIG Date
Microsoft Windows Server 2012 Domain Controller Security Technical Implementation Guide 2013-07-25

Details

Check Text ( C-WN12-GE-000023_chk )
Verify the organization has an automated process to scan systems for identified software flaws and vulnerabilities. If it does not, this is a finding.
Fix Text (F-WN12-GE-000023_fix)
Establish an automated process to scan systems for identified software flaws and vulnerabilities.