UCF STIG Viewer Logo

The operating system must prevent non-privileged users from circumventing malicious code protection capabilities.


Overview

Finding ID Version Rule ID IA Controls Severity
V-28899 SRG-OS-000194 SV-36890r1_rule Medium
Description
Malicious code protection software must be protected so as to prevent a non-privileged user or a malicious piece of software from disabling the protection mechanism. A common tactic of malware is to identify the type of malicious code protection software running on the system and deactivate it.
STIG Date
Operating System Security Requirements Guide 2013-03-28

Details

Check Text ( None )
None
Fix Text (None)
None