SV-214800r603261_rule
V-214800
SRG-OS-000480-GPOS-00227
RHEL-07-020019
CAT II
10
Install and enable the latest McAfee HIPS package or McAfee ENSL.
Per OPORD 16-0080, the preferred intrusion detection system is McAfee Host Intrusion Prevention System (HIPS) in conjunction with SELinux. McAfee Endpoint Security for Linux (ENSL) is an approved alternative to McAfee Virus Scan Enterprise (VSE) and HIPS. For RHEL 7 systems, SELinux is an approved alternative to McAfee HIPS.
Procedure:
Examine the system to determine if the Host Intrusion Prevention System (HIPS) is installed:
# rpm -qa | grep MFEhiplsm
Verify that the McAfee HIPS module is active on the system:
# ps -ef | grep -i “hipclient”
If the MFEhiplsm package is not installed, check for another intrusion detection system:
# find / -name <daemon name>
Where <daemon name> is the name of the primary application daemon to determine if the application is loaded on the system.
Determine if the application is active on the system:
# ps -ef | grep -i <daemon name>
If the MFEhiplsm package is not installed and an alternate host-based intrusion detection application has not been documented for use, this is a finding.
If no host-based intrusion detection system is installed and running on the system, this is a finding.
V-214800
False
RHEL-07-020019
Per OPORD 16-0080, the preferred intrusion detection system is McAfee Host Intrusion Prevention System (HIPS) in conjunction with SELinux. McAfee Endpoint Security for Linux (ENSL) is an approved alternative to McAfee Virus Scan Enterprise (VSE) and HIPS. For RHEL 7 systems, SELinux is an approved alternative to McAfee HIPS.
Procedure:
Examine the system to determine if the Host Intrusion Prevention System (HIPS) is installed:
# rpm -qa | grep MFEhiplsm
Verify that the McAfee HIPS module is active on the system:
# ps -ef | grep -i “hipclient”
If the MFEhiplsm package is not installed, check for another intrusion detection system:
# find / -name <daemon name>
Where <daemon name> is the name of the primary application daemon to determine if the application is loaded on the system.
Determine if the application is active on the system:
# ps -ef | grep -i <daemon name>
If the MFEhiplsm package is not installed and an alternate host-based intrusion detection application has not been documented for use, this is a finding.
If no host-based intrusion detection system is installed and running on the system, this is a finding.
M
2899