Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-220707 | WN10-00-000045 | SV-220707r793194_rule | High |
Description |
---|
Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this type of software will aid in elimination of the software from the operating system. |
STIG | Date |
---|---|
Windows 10 Security Technical Implementation Guide | 2021-08-18 |
Check Text ( C-22422r793192_chk ) |
---|
Verify an anti-virus solution is installed on the system and in use. The anti-virus solution may be bundled with an approved Endpoint Security Solution. Verify if Windows Defender is in use or enabled: Open "PowerShell". Enter “get-service | where {$_.DisplayName -Like "*Defender*"} | Select Status,DisplayName” Verify third-party antivirus is in use or enabled: Open "PowerShell". Enter “get-service | where {$_.DisplayName -Like "*mcafee*"} | Select Status,DisplayName” Enter “get-service | where {$_.DisplayName -Like "*symantec*"} | Select Status,DisplayName” If there is no anti-virus solution installed on the system, this is a finding. |
Fix Text (F-22411r793193_fix) |
---|
If no anti-virus software is on the system and in use, install Windows Defender or a third-party anti-virus solution. |