UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The Symantec Endpoint Protection client weekly scheduled scan must be configured to prevent users from stopping a scheduled scan.


Overview

Finding ID Version Rule ID IA Controls Severity
V-42706 DTASEP052 SV-55434r1_rule Medium
Description
Antivirus software is the mostly commonly used technical control for malware threat mitigation. Antivirus software on hosts should be configured to scan all hard drives regularly to identify any file system infections and to scan any removable media, if applicable, before media is inserted into the system. Not scheduling a regular scan of the hard drives of a system and/or not configuring the scan to scan all files and running processes introduces, a higher risk of threats going undetected.
STIG Date
Symantec Endpoint Protection 12.1 Managed Client Antivirus 2014-07-03

Details

Check Text ( C-48978r1_chk )
Server check: From the Symantec Endpoint Protection Management Server, Symantec Endpoint Protection Management Console: Select Policies -> Double-click the applied policy -> Under Windows Settings, Scheduled Scans -> Select Administrator-Defined Scans -> Double-click the Weekly Scan -> Under the Advanced, Scan Progress Options -> Ensure "Allow the user to stop a scan" is NOT selected.

Criteria: If "Allow the user to stop a scan" is selected, this is a finding.

Client Check: There is no way to properly validate on the client side. It must be performed on the server.
Fix Text (F-48292r1_fix)
From the Symantec Endpoint Protection Management Server, Symantec Endpoint Protection Management Console: Select Policies -> Double-click the applied policy -> Under Windows Settings, Scheduled Scans -> Select Administrator-Defined Scans -> Double-click the Weekly Scan -> Under the Advanced, Scan Progress Options -> Ensure "Allow the user to stop a scan" is NOT selected.