SV-221706r603260_rule
V-221706
SRG-OS-000191-GPOS-00080
OL07-00-020019
CAT II
10
Install and enable the latest McAfee HIPS package, available from USCYBERCOM.
Note: If the system does not support the McAfee HIPS package, install and enable a supported intrusion detection system application and document its use with the Authorizing Official.
Consult with the SA or ISSO to determine if a host-based intrusion detection application is loaded on the system. Per OPORD 16-0080, the preferred intrusion detection system is McAfee HBSS available through the U.S. Cyber Command (USCYBERCOM).
If another host-based intrusion detection application is in use, such as SELinux, this must be documented and approved by the local Authorizing Official.
Procedure:
Examine the system to determine if the Host Intrusion Prevention System (HIPS) is installed:
# rpm -qa | grep MFEhiplsm
Verify the McAfee HIPS module is active on the system:
# ps -ef | grep -i "hipclient"
If the MFEhiplsm package is not installed, check for another intrusion detection system:
# find / -name <daemon name>
Where <daemon name> is the name of the primary application daemon to determine if the application is loaded on the system.
Determine if the application is active on the system:
# ps -ef | grep -i <daemon name>
If the MFEhiplsm package is not installed and an alternate host-based intrusion detection application has not been documented for use, this is a finding.
If no host-based intrusion detection system is installed and running on the system, this is a finding.
V-221706
False
OL07-00-020019
Consult with the SA or ISSO to determine if a host-based intrusion detection application is loaded on the system. Per OPORD 16-0080, the preferred intrusion detection system is McAfee HBSS available through the U.S. Cyber Command (USCYBERCOM).
If another host-based intrusion detection application is in use, such as SELinux, this must be documented and approved by the local Authorizing Official.
Procedure:
Examine the system to determine if the Host Intrusion Prevention System (HIPS) is installed:
# rpm -qa | grep MFEhiplsm
Verify the McAfee HIPS module is active on the system:
# ps -ef | grep -i "hipclient"
If the MFEhiplsm package is not installed, check for another intrusion detection system:
# find / -name <daemon name>
Where <daemon name> is the name of the primary application daemon to determine if the application is loaded on the system.
Determine if the application is active on the system:
# ps -ef | grep -i <daemon name>
If the MFEhiplsm package is not installed and an alternate host-based intrusion detection application has not been documented for use, this is a finding.
If no host-based intrusion detection system is installed and running on the system, this is a finding.
M
4089