STIGQter STIGQter: STIG Summary:

McAfee Application Control 8.x Security Technical Implementation Guide

Version: 2

Release: 1 Benchmark Date: 23 Oct 2020

CheckedNameTitle
SV-213316r506897_ruleA McAfee Application Control written policy must be documented to outline the organization-specific variables for application whitelisting.
SV-213317r506897_ruleThe use of a Solidcore 8.x local Command Line Interface (CLI) Access Password must be documented in the organizations written policy.
SV-213318r506897_ruleThe Solidcore client Command Line Interface (CLI) Access password complexity requirements must be documented in the organizations written policy.
SV-213319r506897_ruleThe Solidcore client Command Line Interface (CLI) Access Password protection process must be documented in the organizations written policy.
SV-213320r506897_ruleThe requirement for scheduled Solidcore client Command Line Interface (CLI) Access Password changes must be documented in the organizations written policy.
SV-213321r506897_ruleThe process by which the Solidcore client Command Line Interface (CLI) Access Password is made available to administrators when needed must be documented in the organizations written policy.
SV-213322r506897_ruleThe McAfee Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be confined to the organizations enclave.
SV-213323r506897_ruleThe configuration of features under McAfee Application Control Options policies Enforce feature control must be documented in the organizations written policy.
SV-213324r506897_ruleThe organizations written policy must include a process for how whitelisted applications are deemed to be allowed.
SV-213325r506897_ruleThe organizations written policy must include procedures for how often the whitelist of allowed applications is reviewed.
SV-213326r506897_ruleThe Solidcore client must be enabled.
SV-213327r506897_ruleThe Solidcore client Command Line Interface (CLI) must be in lockdown mode.
SV-213328r506897_ruleThe Solidcore client Command Line Interface (CLI) Access Password must be changed from the default.
SV-213329r506897_ruleThe organization-specific Rules policy must only include executable and dll files that are associated with applications as allowed by the organizations written policy.
SV-213330r506897_ruleThe McAfee Application Control Options Reputation setting must be configured to use the McAfee Global Threat Intelligence (McAfee GTI) option.
SV-213331r506897_ruleThe McAfee Application Control Options Reputation-Based Execution settings, if enabled, must be configured to allow Most Likely Trusted or Known Trusted only.
SV-213332r506897_ruleThe McAfee Application Control Options Advanced Threat Defense (ATD) settings must not be enabled unless an internal ATD is maintained by the organization.
SV-213333r506897_ruleThe McAfee Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be configured to send all binaries with a reputation of Might be Trusted and below for analysis.
SV-213334r506897_ruleThe McAfee Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be configured to only send binaries with a size of 5 MB or less.
SV-213335r506897_ruleOrganization-specific McAfee Applications Control Options policies must be created and applied to all endpoints.
SV-213336r506897_ruleThe McAfee Application Control Options policy must be configured to disable Self-Approval.
SV-213337r506897_ruleThe McAfee Application Control Options policy End User Notification, if configured by organization, must have all default variables replaced with the organization-specific data.
SV-213338r561345_ruleThe McAfee Application Control Options policies Enforce feature control memory protection must be enabled.
SV-213339r506897_ruleEnabled features under McAfee Application Control Options policies Enforce feature control must not be configured unless documented in written policy and approved by ISSO/ISSM.
SV-213340r506897_ruleThe McAfee Application Control Options Inventory option must be configured to hide OS Files.
SV-213341r557322_ruleThe McAfee Application Control Options Inventory interval option must be configured to pull inventory from endpoints on a regular basis not to exceed seven days.
SV-213342r506897_ruleThe McAfee Applications Default Rules policy must be part of the effective rules policy applied to every endpoint.
SV-213343r506897_ruleA copy of the McAfee Default Rules policy must be part of the effective rules policy applied to every endpoint.
SV-213344r506897_ruleThe organization-specific Rules policies must be part of the effective rules policy applied to all endpoints.
SV-213345r506897_ruleThe organization-specific Solidcore Client Policies must be created and applied to all endpoints.
SV-213346r506897_ruleThe Throttling settings must be enabled and configured to settings according to organizations requirements.
SV-213347r506897_ruleThe Solidcore Client Exception Rules must be documented in the organizations written policy.