STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Trend Micro Deep Security 9.x Security Technical Implementation Guide

V-241172

CAT II (Medium)

Trend Deep Security must, when unauthorized network services are detected, log the event and alert the ISSO, ISSM, and other individuals designated by the local organization.

Rule ID

SV-241172r879835_rule

STIG

Trend Micro Deep Security 9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-002684

Discussion

Unauthorized or unapproved network services lack organizational verification or validation and therefore, may be unreliable or serve as malicious rogues for valid services. The detection of such unauthorized services must be logged and appropriate personnel must be notified. This requirement can be addressed by a host-based IDS capability or by remote scanning functionality.

Check Content

Review the Trend Deep Security server configuration to ensure the event is logged, and the ISSO, ISSM, and other individuals designated by the local organization are alerted when unauthorized network services are detected.

Policies are templates that specify the settings and security rules to be configured and enforced automatically for one or more computers. These compact, manageable rule sets make it simple to provide comprehensive security without the need to manage thousands of rules. Default Policies provide the necessary rules for a wide range of common computer configurations. 

Select “Computers” from the top menu and double click on any computer from the list.

Under Firewall >> General Tab >> Firewall area, verify "Configuration" is set to "On".

If "Configuration" is set to “Off”, this is a finding. 

Under Intrusion Detection >> General Tab >> Intrusion Detection area, verify "Configuration" is set to "On".

If "Configuration" is set to “Off”, this is a finding.

Fix Text

Configure the Trend Deep Security server to log the event and alert the ISSO, ISSM, and other individuals designated by the local organization, when unauthorized network services are detected.

Create a new Policy based on a Recommendation Scan of a computer.

To do so, right click the computer on the “Computers” page and select Actions >> Scan for Recommendations.
 
When the scan is complete, return to the “Policies” page and click “New” to display the “New Policy” wizard.

Enter the policy name and choose “None” from the “Inherit From” option.

When prompted, choose to base the new Policy on "an existing computer's current configuration".
 
Then select "Recommended Application Types and Intrusion Prevention Rules", "Recommended Integrity Monitoring Rules", and "Recommended Log Inspection Rules" from among the computer's properties.

Firewall rules should be created for each individual computer in order to prevent services from being disrupted.

You can create a new Firewall policy based on a Recommendation Scan of a computer.

To do so, double click on a computer on the Computers page and select Firewall >> Scan for Open Ports.

Assign the necessary Firewall rules based on the open ports identified.

Apply other rules as necessary.