STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 6 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Trend Micro TippingPoint IDPS Security Technical Implementation Guide

V-242188

CAT II (Medium)

The SMS must be configured to remove or disable nonessential capabilities on SMS and TPS, which are not required for operation or not related to IDPS functionality.

Rule ID

SV-242188r1028381_rule

STIG

Trend Micro TippingPoint IDPS Security Technical Implementation Guide

Version

V2R2

CCIs

CCI-000381

Discussion

An IDPS can be capable of providing a wide variety of capabilities. Not all of these capabilities are necessary. Unnecessary services, functions, and applications increase the attack surface (sum of attack vectors) of a system. These unnecessary capabilities are often overlooked and therefore, may remain unsecured. Examples of unneeded services on TPS are web server, telnet, and TAXII.

Check Content

1. In the Trend Micro SMS interface, go to the "Devices" tab. 
2. Select the Device to be modified. 
3. Click "Device Configuration" and "Services". 

If HTTPS or TAXII are enabled, this is a finding.

Fix Text

1. In the Trend Micro SMS interface, go to the "Devices" tab. 
2. Select the device to be modified. 
3. Click "Device Configuration" and "Services". 
4. Uncheck enabled for HTTPS and TAXII. 
5. Under SSH ensure "SSH Login Grace Time" is set to 60 and "SSH Max Authentication Attempts" is set to "3".
6. Click "OK".