All UC Berkeley IT Resources and all devices connected to the UC Berkeley network or cloud services must comply with the Minimum Security Standard for Networked Devices (MSSND). The recommendations below are provided as optional guidance to assist with achieving the Anti-malware Software requirement.
When built-in anti-malware features are available in operating systems, such as with current versions of Windows and macOS, they must be enabled. Otherwise, separate anti-malware software that supports real-time scanning is recommended, including for network storage appliances. This requirement does not apply to mobile devices. Please refer to the Guidelines for specific use cases, including Linux.
Malware is short for “malicious software” and broadly describes all software that is designed to provide unauthorized access or perform unauthorized actions on a system. The impact of malware can range from minor system performance issues to complete hard drive deletion or even full, remote control of a system by an attacker. It is important to detect malware before it infects or has the potential to do anything malicious on a system.
While anti-malware software provides significant protection against malware of all types, it is not 100% effective. Requirement #9, “Privileged Accounts" provides additional protection against malware which may not be detected by anti-malware software.
1. Institutionally-owned and Managed Devices
Minimum Security Standard for Networked Devices (MSSND) requirements are covered by Endpoint Operations and Services (EOS) for ITCS and departmental IT-supported systems that are institutionally owned and are managed by BigFix.
- For institutionally-owned devices that are not supported by ITCS, contact the EOS team to get started with managed client services: https://technology.berkeley.edu/services/device-support/berkeley-desktop
2. Personal Devices and Unmanaged Institutionally-owned Devices
Windows and MacOS:
Current, manufacturer-supported versions of Windows 8 and higher, and macOS operating systems contain built-in anti-malware protections that meet MSSND requirements. Personal devices and unmanaged institutionally-owned devices should be maintained at these operating system release levels.
- For Windows computers, be sure to confirm that Windows Defender is turned on.
- The Information Security Office does not generally recommend downloading and installing free, third party anti-virus/anti-malware tools on top of the built-in protections for either Windows or macOS. Also see the “Licensing Note” below.
Useful tools in the anti-malware software space for Linux are limited. To mitigate the damage that malware can do:
- Desktops: Enable SELinux or AppArmor. Alternatively, install and enable ClamAV or Sophos AV for Linux.
- Servers: Enable SELinux or AppArmor. Alternatively, run a host-based intrusion detection system (HIDS), e.g. OSSec.
- P4 systems: Work with ISO to install the FireEye Endpoint Detection and Remediation (EDR) agent for P4 systems, or a suitable alternative.
Also critical for Linux is to keep your system patched and up to date (see MSSND requirement #1).
ISO also recommends locking down your system according to the CIS level 2 benchmarks.
Certain free anti-malware software is only free for personal use. Always check the licensing agreement for software not included in your operating system. Software for personal use only may not be installed on a university device or registered under your @berkeley.edu account.
3. Enable Real-time Scanning Where Available
In order to detect malware before it is able to infect a system, enable real-time scanning where available. Real-time scanning will analyze files and programs as they are copied to a system in order to prevent the user from unknowingly becoming infected.