Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
SRG-NET-000181-NDM-000140 | SRG-NET-000181-NDM-000140 | SRG-NET-000181-NDM-000140_rule | Medium |
Description |
---|
The network device monitors the network for known vulnerabilities and malicious software, such as Trojan horses, hacker tools, DDoS agents, and spyware. Many of these vulnerabilities may not be detected by anti-virus software or host-based intrusion detection systems. Unauthorized software may contain malware or malicious code which may be exploited by an attacker to gain access. |
STIG | Date |
---|---|
Network Device Management Security Requirements Guide | 2013-07-30 |
Check Text ( C-SRG-NET-000181-NDM-000140_chk ) |
---|
Verify the network device is configured to detect the presence of unauthorized software. If the network device is not configured to detect the presence of unauthorized software, this is a finding. |
Fix Text (F-SRG-NET-000181-NDM-000140_fix) |
---|
Configure the network device to detect unauthorized software. |