UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The network device must be configured to detect the presence of unauthorized software on organizational information systems.


Overview

Finding ID Version Rule ID IA Controls Severity
SRG-NET-000181-NDM-000140 SRG-NET-000181-NDM-000140 SRG-NET-000181-NDM-000140_rule Medium
Description
The network device monitors the network for known vulnerabilities and malicious software, such as Trojan horses, hacker tools, DDoS agents, and spyware. Many of these vulnerabilities may not be detected by anti-virus software or host-based intrusion detection systems. Unauthorized software may contain malware or malicious code which may be exploited by an attacker to gain access.
STIG Date
Network Device Management Security Requirements Guide 2013-07-30

Details

Check Text ( C-SRG-NET-000181-NDM-000140_chk )
Verify the network device is configured to detect the presence of unauthorized software. If the network device is not configured to detect the presence of unauthorized software, this is a finding.
Fix Text (F-SRG-NET-000181-NDM-000140_fix)
Configure the network device to detect unauthorized software.