![]() ![]() Specialized Security-Limited Functionality (SSLF)ĭoD Directive (DoDD) 8500.This STIG gives technology-specific information for the Symantec Enpoint Protection 12.1 Antivirus Locally Configured. The Symantec Endpoint Protection 12.1 Antivirus can be configured directly on each local client or via the Symantec Endpoint Protection Management Server to all managed clients. These requirements address several major forms of malware, including viruses, worms, Trojan horses, malicious mobile code, blended attacks, spyware tracking cookies, and attacker tools, such as backdoors and root kits. but Our service delivery team currently manages multiple platforms, securing millions of users. Another common form is virus hoaxes, which are false warnings of new malware threats. Symantec Endpoint Protection Key offers tools, state-of-the-art technology and more than 30 years of endpoint security experience to help protect your environment throughout the day. One of these forms that has become commonplace is phishing, which is using deceptive computer-based means to trick individuals into disclosing sensitive information. Organizations also face similar threats from a few forms of non-malware threats that are often associated with malware. ![]() Although privacy violating malware has been in use for many years, it has become much more widespread recently, with spyware invading many systems to monitor personal activities and conduct financial fraud. Spyware malware's intention is to violate a user’s privacy and has become a major concern to organizations. Malware has become the most significant external threat to most systems, causing widespread damage and disruption, and necessitating extensive recovery efforts within most organizations. Malware, also known as malicious code and malicious software, refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim’s data, applications, or operating system or otherwise annoying or disrupting the victim. This McAfee Antivirus STIG provides the technical security policies, requirements, and implementation details for applying security concepts to Commercial-Off-The-Shelf (COTS) applications. This guidance supports DoD system design, development, implementation, certification, and accreditation efforts. These requirements are designed to assist Security Managers (SMs), Information Security System Managers (ISSMs), Information Security System Officers (ISSOs), and System Administrators (SAs) with configuring and maintaining security controls. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |