STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Trend Micro Deep Security 9.x Security Technical Implementation Guide

V-241150

CAT II (Medium)

Trend Deep Security must be configured to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.

Rule ID

SV-241150r879665_rule

STIG

Trend Micro Deep Security 9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-001243

Discussion

Malicious code protection mechanisms include, but are not limited, to anti-virus and malware detection software. In order to minimize potential negative impact to the organization that can be caused by malicious code, it is imperative that malicious code is identified and eradicated. Applications providing this capability must be able to perform actions in response to detected malware. Responses include blocking, quarantining, deleting, and alerting. Other technology- or organization-specific responses may also be employed to satisfy this requirement. Malicious code includes viruses, worms, Trojan horses, and Spyware. This requirement applies to applications providing malicious code protection.

Check Content

Review the Trend Deep Security server configuration to ensure malicious code is blocked and quarantined upon detection, then send an immediate alert to appropriate individuals.

Verify the “Custom remediation actions” for “Recognized Malware” under the Policy settings for Anti-Malware.
- Under “Policies” tab right click any of the selected policies and click “Details.”
- Choose “Anti-Malware” and deselect “Default Real-Time Scan Configuration.”  Be sure to re-enable this option once the review is complete.
- Click “Edit” and select “Actions.”
- Under the “Recognized Malware” verify the following settings:
  - For Virus: Clean
  - For Trojans: Quarantine
  - For Packer: Quarantine
  - For Spyware: Quarantine
  - For Other Threats: Clean
- Under “Possible Malware” verify “Quarantine” is selected.

If any of the settings are not configured accordingly, this is a finding.

Fix Text

Configure the Trend Deep Security server to block and quarantine malicious code upon detection, then send an immediate alert to appropriate individuals.

Configure the “Custom remediation actions” for “Recognized Malware” under the Policy settings for Anti-Malware.
- Under “Policies” tab right click any of the selected policies and click “Details.” 
- Choose “Anti-Malware” and deselect “Default Real-Time Scan Configuration.”  Be sure to re-enable this option once the review is complete. 
- Click “Edit” and select “Actions.”
- Under the “Recognized Malware” configure the following settings:
  - For Virus: Clean
  - For Trojans: Quarantine
  - For Packer: Quarantine
  - For Spyware: Quarantine
  - For Other Threats: Clean
- Under “Possible Malware” select “Quarantine.”