SV-104297r1_rule
V-94343
SRG-NET-000391-ALG-000140
SYMP-AG-000650
CAT II
10
Configure proxy services.
1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Review each service specified in the list with the ProxySG administrator to ensure that all remote access traffic has been accounted for and add any that are missing per the ProxySG Administration Guide, Chapter 7: Managing Proxy Services.
4. Click Configuration >> Policy >> Visual Policy Manager >> Launch.
5. Click each layer and right-click the "Source" and "Destination" fields for each rule. Select "Set" and set each to the organizationally defined values in accordance with the site's SSP.
Determine what proxy services are enabled on the ProxySG.
1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Review each service specified in the list with the ProxySG administrator to verify that all remote access traffic has been accounted for.
4. Click Configuration >> Policy >> Visual Policy Manager >> Launch.
5. Click each layer and Verify that the "Source" and "Destination" fields for each rule are set to the organizationally defined sources and destinations.
If Symantec ProxySG providing content filtering does not continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions, this is a finding.
V-94343
False
SYMP-AG-000650
Determine what proxy services are enabled on the ProxySG.
1. Log on to the Web Management Console.
2. Browse to Configuration >> Services >> Proxy Services.
3. Review each service specified in the list with the ProxySG administrator to verify that all remote access traffic has been accounted for.
4. Click Configuration >> Policy >> Visual Policy Manager >> Launch.
5. Click each layer and Verify that the "Source" and "Destination" fields for each rule are set to the organizationally defined sources and destinations.
If Symantec ProxySG providing content filtering does not continuously monitor outbound communications traffic crossing internal security boundaries for unusual/unauthorized activities or conditions, this is a finding.
M
3515