Source | Azure Portal | ||
Display name | Microsoft Managed Control 1682 - Malicious Code Protection | Nonsignature-Based Detection | ||
Id | 62b638c5-29d7-404b-8d93-f21e4b1ce198 | ||
Version | 1.0.0 Details on versioning |
||
Versioning |
Versions supported for Versioning: 0 Built-in Versioning [Preview] |
||
Category | Regulatory Compliance Microsoft Learn |
||
Description | Microsoft implements this System and Information Integrity control | ||
Additional metadata |
Name/Id: ACF1682 / Microsoft Managed Control 1682 Category: System and Information Integrity Title: Malicious Code Protection | Nonsignature-Based Detection Ownership: Customer, Microsoft Description: The information system implements nonsignature-based malicious code detection mechanisms. Requirements: ServersAzure utilizes System Center Endpoint Protection (SCEP), Microsoft Endpoint Protection (MEP), Microsoft Defender for Endpoint (MDE), and ClamAV to detect malicious code. In addition to signature-based detection mechanisms, these tools also utilize behavior monitoring, network inspection, and heuristics to detect malicious code that may be missed by signature-based methods. Network Devices Network devices do not natively support anti-malware software, but are protected through a combination of the server-based anti-malware software and the secure coding practices required by the Security Development Lifecycle (SDL), configuration management and control, supply chain processes, and in-depth logging and monitoring. |
||
Mode | Indexed | ||
Type | Static | ||
Preview | False | ||
Deprecated | False | ||
Effect | Fixed audit |
||
RBAC role(s) | none | ||
Rule aliases | none | ||
Rule resource types | IF (2) Microsoft.Resources/subscriptions Microsoft.Resources/subscriptions/resourceGroups |
||
Compliance | Not a Compliance control | ||
Initiatives usage | none | ||
History | none | ||
JSON compare | n/a | ||
JSON |
|