STIGhubSTIGhub
STIGsRMF ControlsCompare

STIGhub

A free tool to search and browse the entire DISA STIG library. Saves up to 75% in security compliance research time.

Navigation

  • Browse STIGs
  • Search
  • RMF Controls
  • Compare Versions

Resources

  • About
  • Release Notes
  • VPAT
  • DISA STIG Library
STIGs updated 4 hours ago
Powered by Pylon
© 2026 Beacon Cloud Solutions, Inc. All rights reserved.
← Back to Trend Micro Deep Security 9.x Security Technical Implementation Guide

V-241162

CAT II (Medium)

Trend Deep Security must prohibit user installation of software without explicit privileged status.

Rule ID

SV-241162r879751_rule

STIG

Trend Micro Deep Security 9.x Security Technical Implementation Guide

Version

V2R1

CCIs

CCI-001812

Discussion

Allowing regular users to install software, without explicit privileges, creates the risk that untested or potentially malicious software will be installed on the system. Explicit privileges (escalated or administrative privileges) provide the regular user with explicit capabilities and control that exceeds the rights of a regular user. Application functionality will vary, and while users are not permitted to install unapproved applications, there may be instances where the organization allows the user to install approved software packages such as from an approved software repository. The application must enforce software installation by users based upon what types of software installations are permitted (e.g., updates and security patches to existing software) and what types of installations are prohibited (e.g., software whose pedigree with regard to being potentially malicious is unknown or suspect) by the organization. This requirement applies, for example, to applications that provide the ability to extend application functionality (e.g., plug-ins, add-ons) and software management applications.

Check Content

Review the Trend Deep Security server configuration to ensure user installation of software without explicit privileged status is prohibited.

Analyze the system using Administration >> User Management >> Roles.
Review each role created that is not “Full Access”.
Right-Click >> Properties on the desired role, and select “Other Rights.”
The “Updates” setting should be set to “View Only” or “Hide.” 

If any other option is selected other than “View Only” or “Hide”, this is a finding.

Fix Text

Configure the Trend Deep Security server to prohibit user installation of software without explicit privileged status.

Configure the application to prevent non-authorized users from updating Deep Security by selecting Administration >> User Management >> Roles.
Right-Click >> Properties on any of the roles listed and choose “Other Rights.”
Set the “Updates” setting to “View Only” or “Hide”.