UCF STIG Viewer Logo

The organization must employ malicious code protection mechanisms at workstations, servers, or mobile computing devices on the network to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, Web accesses, removable media, or other common means.


Overview

Finding ID Version Rule ID IA Controls Severity
V-27493 SRG-NET-NA SV-34802r1_rule Medium
Description
SI-8 is all for spam protection. Network elements do not receive mail.
STIG Date
Network Security Requirements Guide 2011-12-28

Details

Check Text ( None )
None
Fix Text (None)
None