STIGhubSTIGhub
STIGsRMF ControlsCompare
STIGhub— A free STIG search and compliance tool·STIGs updated 3 days ago
Powered by Pylon·Privacy·Terms·© 2026 Beacon Cloud Solutions, Inc.
← Back to Apple macOS 12 (Monterey) Security Technical Implementation Guide

V-252518

CAT I (High)

The macOS system must use an approved antivirus program.

Rule ID

SV-252518r991589_rule

STIG

Apple macOS 12 (Monterey) Security Technical Implementation Guide

Version

V1R9

CCIs

CCI-000366

Discussion

An approved antivirus product must be installed and configured to run. Malicious software can establish a base on individual desktops and servers. Employing an automated mechanism to detect this type of software will aid in elimination of the software from the operating system.

Check Content

Verify the "MRT" service is running by using the following command:

/bin/launchctl print-disabled system | grep mrt

If the results show "com.apple.mrt" => false", the MRT Service is running.

If the MRT service is running, verify that it is configured to update automatically by using the following command:

/usr/sbin/system_profiler SPConfigurationProfileDataType | /usr/bin/grep ConfigDataInstall

If, "ConfigDataInstall = 1" is not returned, this is a finding.

If the MRT service is not running, ask the System Administrator (SA) or Information System Security Officer (ISSO) if an approved antivirus solution is loaded on the system. The antivirus solution may be bundled with an approved host-based security solution.

If there is no local antivirus solution installed on the system, this is a finding.

Fix Text

Enable the MRT service:

/usr/bin/sudo /bin/launchctl enable system/com.apple.mrt

Installing the "Restrictions Policy" will configure the MRT Service to update automatically.

If the MRT Service is not being used, install an approved antivirus solution onto the system.