UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

The SMS must be configured to remove or disable non-essential capabilities on SMS and TPS which are not required for operation or not related to IDPS functionality (e.g., web server, SSH, telnet, and TAXII).


Overview

Finding ID Version Rule ID IA Controls Severity
V-242188 TIPP-IP-000230 SV-242188r710107_rule Medium
Description
An IDPS can be capable of providing a wide variety of capabilities. Not all of these capabilities are necessary. Unnecessary services, functions, and applications increase the attack surface (sum of attack vectors) of a system. These unnecessary capabilities are often overlooked and therefore may remain unsecured.
STIG Date
Trend Micro TippingPoint IDPS Security Technical Implementation Guide 2024-06-10

Details

Check Text ( C-45463r710105_chk )
1. In the Trend Micro SMS interface, go to the "Devices" tab".
2. Select the Device to be modified.
3. Click "Device Configuration" and "Services".

If SSH is enabled, this is a finding.

Under "FIPS Settings", if the box is unchecked, this is a finding.
Fix Text (F-45421r710106_fix)
1. In the Trend Micro SMS interface, go to the "Devices" tab".
2. Then Select the Device to be modified.
3. Click "Device Configuration" and "Services".
4. Uncheck enabled for SSH.
5. Go to "FIPS Settings", select "enabled" for "FIPS Mode".
6. Click OK.
CAUTION: This should be done under an approved maintenance window, as selecting FIPS Mode will cause the TPS to reboot.