Source | Azure Portal | ||
Display name | Microsoft Managed Control 1679 - Malicious Code Protection | ||
Id | 2cf42a28-193e-41c5-98df-7688e7ef0a88 | ||
Version | 1.0.0 Details on versioning |
||
Versioning |
Versions supported for Versioning: 0 Built-in Versioning [Preview] |
||
Category | Regulatory Compliance Microsoft Learn |
||
Description | Microsoft implements this System and Information Integrity control | ||
Additional metadata |
Name/Id: ACF1679 / Microsoft Managed Control 1679 Category: System and Information Integrity Title: Malicious Code Protection - False Positives Ownership: Customer, Microsoft Description: The organization: Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system. Requirements: Servers: By default, Azure quarantines malicious code identified from the anti-malware software and does not immediately delete it. Falsely identified malicious code is put in a quarantined folder on the system. Azure can roll back quarantined files if they are falsely determined to be malicious code to resolve impact to operations in the system. Network Devices Network devices do not natively support anti-malware software, but are protected through a combination of the server-based anti-malware software and the secure coding practices required by the Security Development Lifecycle, configuration management and control, supply chain processes, and in-depth logging and monitoring. |
||
Mode | Indexed | ||
Type | Static | ||
Preview | False | ||
Deprecated | False | ||
Effect | Fixed audit |
||
RBAC role(s) | none | ||
Rule aliases | none | ||
Rule resource types | IF (2) Microsoft.Resources/subscriptions Microsoft.Resources/subscriptions/resourceGroups |
||
Compliance | Not a Compliance control | ||
Initiatives usage | none | ||
History | none | ||
JSON compare | n/a | ||
JSON |
|