About 50 results
Open links in new tab
  1. SI-3: Malicious Code Protection - csf.tools

    Implement [Assignment (one or more): signature-based, non-signature-based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; …

  2. 10: Malware Defenses - CSF Tools

    Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.

  3. 8: Malware Defenses - CSF Tools

    Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data …

  4. 8.1: Utilize Centrally Managed Anti-malware Software - csf.tools

    Utilize centrally managed anti-malware software to continuously monitor and defend each of the organization's workstations and servers.

  5. 10.1: Deploy and Maintain Anti-Malware Software - CSF Tools

    Deploy and maintain anti-malware software on all enterprise assets.

  6. UEM-09: Anti-Malware Detection and Prevention - CSF Tools

    Configure managed endpoints with anti-malware detection and prevention technology and services.

  7. 10.6: Centrally Manage Anti-Malware Software - CSF Tools

    Control Statement Centrally manage anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]

  8. TVM-02: Malware Protection Policy and Procedures - CSF Tools

    Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures to protect against malware on managed assets. Review and update the policies …

  9. SI-3: Malicious Code Protection - csf.tools

    The organization: Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code; Updates malicious code protection …

  10. 10.7: Use Behavior-Based Anti-Malware Software - CSF Tools

    Control Statement Use behavior-based anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]