Skip to content

No profile (default benchmark)

Rules and Groups employed by this XCCDF Profile

  • SRG-APP-000386

    Group
  • The Solidcore client must be enabled.

    The Application Control whitelisting must be enabled on all workstation endpoints. To enable Application Control, the Solidcore client needs to be in enabled mode.
    Rule Medium Severity
  • SRG-APP-000383

    Group
  • The Solidcore client Command Line Interface (CLI) must be in lockdown mode.

    By default, when an endpoint's Solidcore installation is managed by the ePO server, the CLI will automatically be in lockdown mode. This will ensure the endpoint receives all of its Solidcore confi...
    Rule High Severity
  • SRG-APP-000386

    Group
  • The Solidcore client Command Line Interface (CLI) Access Password must be changed from the default.

    The Solidcore client can be configured locally at the CLI, but only when accessed with the required password. Since the Trellix Application Control configuration is to be managed by ePO policies, ...
    Rule High Severity
  • SRG-APP-000386

    Group
  • The organization-specific Rules policy must only include executable and dll files that are associated with applications as allowed by the organizations written policy.

    To ensure Solidcore clients are only configured to STIG and organization-specific settings, organization-specific ePO policies must be applied to all organization workstation endpoints. The Trelli...
    Rule Medium Severity
  • SRG-APP-000276

    Group
  • The Trellix Application Control Options Reputation setting must be configured to use the Trellix Global Threat Intelligence (Trellix GTI) option.

    If a Threat Intelligence Exchange (TIE) server is being used in the organization, reputation for files and certificates is fetched from the TIE server. The reputation values control execution at en...
    Rule Medium Severity
  • SRG-APP-000386

    Group
  • The Trellix Application Control Options Reputation-Based Execution settings, if enabled, must be configured to allow Most Likely Trusted or Known Trusted only.

    When a file is executed on an endpoint, the Application Control performs multiple checks to determine whether to allow or ban the execution. Only files with a reputation of "Most Likely Trusted", "...
    Rule Medium Severity
  • SRG-APP-000276

    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings must not be enabled unless an internal ATD is maintained by the organization.

    This option will automatically send files with a specific file reputation to ATD for further analysis. This option is not selected by default and must only be selected if an ATD is being used.
    Rule Medium Severity
  • SRG-APP-000276

    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be configured to send all binaries with a reputation of Might be Trusted and below for analysis.

    When the file reputation of "Might be Trusted" is configured for being forwarded to ATD, all files with the reputation of "Might be Trusted", "Unknown", "Might be Malicious", "Most Likely Malicious...
    Rule Medium Severity
  • SRG-APP-000276

    Group
  • The Trellix Application Control Options Advanced Threat Defense (ATD) settings, if being used, must be configured to only send binaries with a size of 5MB or less.

    Since binaries can be large, the file size must be limited to avoid congestion on the network and degradation on the endpoint when sending the binaries to the ATD.
    Rule Medium Severity
  • SRG-APP-000386

    Group
  • Organization-specific Trellix Applications Control Options policies must be created and applied to all endpoints.

    To ensure Solidcore clients are only configured to STIG and organization-specific settings, organization-specific ePO policies must be applied to all organization workstation endpoints rather than ...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules