DoD STIGs – V-32585


Title: Applications providing malicious code protection must support organizational requirements to address the receipt of false positives during malicious code detection, eradication efforts, and the resulting potential impact on the availability of the information system.

Vulnerability ID: V-32585


IA Controls: None

Severity: medium

Description: In order to minimize potential negative impact to the organization that can be caused by malicious code, it is imperative that malicious code is identified and eradicated. Malicious code includes viruses, worms, Trojan horses, and Spyware. Applications providing this capability must have an ability to address the issue of false alerts. False alerts can overwhelm reporting and administrative interfaces making it difficult to identify the true threat. A filtering capability that serves to identify and remove false positives is often employed to address this issue.

This requirement is specific to applications providing malicious code protection. This requirement is NA for databases.

Check Text: This check is NA for databases.

Fix Text: This fix is NA for databases.


Interpreting V-32585:

As noted, this does not apply to SQL Server databases.

Do be sure that any software that performs checks for malicious code (Anti-virus, etc) exclude the default file types for SQL Server as they can cause MAJOR performance issues.

The file extensions that are recommended to exclude are: MDF, LDF, NDF, BAK and TRN.

For improved security , be sure to only exclude these files in the directories setup and used by SQL Server.

Return to the DoD STIGs – Database Security Requirements Guide

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.