UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The system must use and update a virus scan program.


Overview

Finding ID Version Rule ID IA Controls Severity
V-38666 RHEL-06-000284 SV-50467r3_rule Medium
Description
Virus scanning software can be used to protect a system from penetration by computer viruses and to limit their spread through intermediate systems. The virus scanning software should be configured to perform scans dynamically on accessed files. If this capability is not available, the system must be configured to scan, at a minimum, all altered files on the system on a daily basis. If the system processes inbound SMTP mail, the virus scanner must be configured to scan all received mail.
STIG Date
Red Hat Enterprise Linux 6 Security Technical Implementation Guide 2017-12-08

Details

Check Text ( C-46226r3_chk )
Check for the existence of a virus scan tool to be executed daily in the cron file:

# crontab -l

With the assistance of the system administrator, ensure the virus definition signature files are not older than seven (7) days.

If a virus scanner is not being run daily or the virus definitions are older than seven (7) days, this is a finding.
Fix Text (F-43615r3_fix)
Install a virus scan tool.

Ensure the virus signature definition files are no older than seven (7) days.

Ensure the command line virus scan tool is run on a regular basis using a utility, such as cron.