STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to McAfee Application Control 7.x Security Technical Implementation Guide

V-74201

CAT II (Medium)

The McAfee Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be confined to the organizations enclave.

Rule ID

SV-88875r1_rule

STIG

McAfee Application Control 7.x Security Technical Implementation Guide

Version

V1R4

CCIs

CCI-001240

Discussion

Data will be leaving the endpoint to be analyzed by the ATD. Because data could feasibly be intercepted en route, risk of outside threats is minimized by ensuring the ATD is in the same enclave as the endpoints.

Check Content

If an ATD server is not being used in the environment, this is Not Applicable.

Consult with the ISSO/ISSM to review the written policy to ensure the usage of an ATD is documented.

If the usage of an ATD is not documented in the written policy, this is a finding.

Determine the location of the ATD being used by the organization and verify the ATD is confined to the organization's enclave.

If the location of the ATD being used by the organization cannot be determined and the ATD is not confined to the organization's enclave, this is a finding.

Fix Text

Relocate or reinstall the ATD being used by the organization to be confined to the organization's enclave.