UCF STIG Viewer Logo

The organization must employ malicious code protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27490 SRG-NET-NA SV-34799r1_rule Medium
Description
SI-8 is all for spam protection. Network elements do not receive mail.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None