|Finding ID||Version||Rule ID||IA Controls||Severity|
|Without the use of automated mechanisms to scan for security flaws on a continuous and/or periodic basis, the operating system or other system components may remain vulnerable to the exploits presented by undetected software flaws. To support this requirement, the operating system may have an integrated solution incorporating continuous scanning using HBSS and periodic scanning using other tools, as specified in the requirement.|
|Canonical Ubuntu 20.04 LTS Security Technical Implementation Guide||2022-12-06|
|Check Text ( C-41546r858536_chk )|
| The Ubuntu operating system is not compliant with this requirement; hence, it is a finding. However, the severity level can be mitigated to a CAT III if the ENSLTP module is installed and running. |
Check that the "mcafeetp" package has been installed:
# dpkg -l | grep mcafeetp
If the "mcafeetp" package is not installed, this finding will remain as a CAT II.
Check that the daemon is running:
# /opt/McAfee/ens/tp/init/mfetpd-control.sh status
If the daemon is not running, this finding will remain as a CAT II.
|Fix Text (F-41505r858537_fix)|
| The Ubuntu operating system is not compliant with this requirement; however, the severity level can be mitigated to a CAT III if the ENSLTP module is installed and running. |
Configure the Ubuntu operating system to use ENSLTP.
Install the "mcafeetp" package via the ePO server.