STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Arctic Wolf CylanceON-PREM Security Technical Implementation Guide

V-272635

CAT II (Medium)

CylanceON-PREM must enforce that all files accessed are evaluated against the AI model for potential threats.

Rule ID

SV-272635r1112755_rule

STIG

Arctic Wolf CylanceON-PREM Security Technical Implementation Guide

Version

V1R1

CCIs

CCI-001242

Discussion

CylanceON-PREM enforces file evaluations against its AI model to ensure proactive, predictive, and comprehensive security. Failure to scan files introduces a potential risk to the system.

Check Content

Verify Background Threat Detection and File Watcher settings are enabled. Administrator rights are required.

1. Log in to the admin console.
2. Navigate to POLICIES.
3. Click on each device policy.

If Background Threat Detection or File Watcher settings are disabled, this is a finding.

If there are no enabled policies, this is a finding.

Fix Text

Configure Background Threat Detection and File Watcher settings to enabled. Administrator rights are required.

1. Log in to the admin console.
2. Navigate to POLICIES.
3. Under "Action", choose "Edit".
4. Enable "Background Threat Detection".
5. Enable "File Watcher".
6. Click "Save Policy & Finish".