Malicious Code Protection System Inspection
Frequent spot-checks should be made to ensure that all malicious code protection systems are updated, run on-time and complete their scan. Failure to do so may seriously compromise the security of our computer systems.
Malicious code includes viruses, worms, ransomware, Trojan horses, and spyware. Malicious code can be encoded in various formats, contained within compressed or hidden files, or hidden in files using techniques such as steganography. Malicious code can be inserted into systems in a variety of ways including web accesses, electronic mail, electronic mail attachments, and portable storage devices. Malicious code insertions occur through the exploitation of system vulnerabilities.
Designated locations include system entry and exit points which may include firewalls, remote access servers, workstations, electronic mail servers, web servers, proxy servers, notebook computers, and mobile devices.
Malicious code protection mechanisms include anti-virus signature definitions and reputation-based technologies.
Check MCPS runs as scheduled
Check MCPS completes