About 50 results
Open links in new tab
  1. SI-3: Malicious Code Protection - csf.tools

    Implement [Assignment (one or more): signature-based, non-signature-based] malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code; Automatically …

  2. 10: Malware Defenses - CSF Tools

    Prevent or control the installation, spread, and execution of malicious applications, code, or scripts on enterprise assets.

  3. 8: Malware Defenses - CSF Tools

    Control the installation, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the use of automation to enable rapid updating of defense, data gathering, and …

  4. 8.1: Utilize Centrally Managed Anti-malware Software - csf.tools

    Utilize centrally managed anti-malware software to continuously monitor and defend each of the organization's workstations and servers.

  5. 10.1: Deploy and Maintain Anti-Malware Software - CSF Tools

    Deploy and maintain anti-malware software on all enterprise assets.

  6. UEM-09: Anti-Malware Detection and Prevention - CSF Tools

    Configure managed endpoints with anti-malware detection and prevention technology and services.

  7. 10.6: Centrally Manage Anti-Malware Software - CSF Tools

    Control Statement Centrally manage anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]

  8. TVM-02: Malware Protection Policy and Procedures - CSF Tools

    Establish, document, approve, communicate, apply, evaluate and maintain policies and procedures to protect against malware on managed assets. Review and update the policies and procedures at …

  9. SI-3: Malicious Code Protection - csf.tools

    The organization: Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code; Updates malicious code protection mechanisms …

  10. 10.7: Use Behavior-Based Anti-Malware Software - CSF Tools

    Control Statement Use behavior-based anti-malware software. [csf.tools Note: For more information on the Critical Security Controls, visit the Center for Internet Security.]