UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

SLEM 5 must implement an endpoint security tool.


Overview

Finding ID Version Rule ID IA Controls Severity
V-261264 SLEM-05-211015 SV-261264r995659_rule Medium
Description
Adding endpoint security tools can provide the capability to automatically take actions in response to malicious behavior, which can provide additional agility in reacting to network threats. These tools also often include a reporting capability to provide network awareness of the system, which may not otherwise exist in an organization's systems management regime.
STIG Date
SUSE Linux Enterprise Micro (SLEM) 5 Security Technical Implementation Guide 2024-06-04

Details

Check Text ( C-64993r995657_chk )
Verify that SLEM 5 has implemented an endpoint security tool.

If no endpoint security tool is present and enabled on the system, this is a finding.
Fix Text (F-64901r995658_fix)
Install and enable an endpoint security tool.