[Forgot Password]
Login  Register Subscribe

30389

 
 

423868

 
 

244411

 
 

909

 
 

193363

 
 

277

Paid content will be excluded from the download.


Download | Alert*
CCE
view XML

CCE-38377-8

Platform: cpe:/o:microsoft:windows_server_2012::r2Date: (C)2015-10-08   (M)2023-07-04



Port number Exclusions This policy setting defines a list of TCP port numbers from which network traffic inspection will be disabled. Port numbers should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of a TCP port number. As an example, a range might be defined as: 8080. The value is not used and it is recommended that this be set to 0. If you configure this setting, network traffic inspection will be disabled on the TCP port numbers in the list. If you disable or do not configure this setting, network traffic inspection will be performed on all TCP port numbers.


Parameter:

[default]


Technical Mechanism:

(1) GPO: Computer ConfigurationAdministrative TemplatesWindows ComponentsWindows DefenderNetwork Inspection System Exclusions!Port number Exclusions (2) REG: HKEY_LOCAL_MACHINESoftwarePoliciesMicrosoftWindows DefenderNISConsumersIPSExclusionsPorts!Nis_Consumers_IPS_Exclusions_Ports_Port_Number

CCSS Severity:CCSS Metrics:
CCSS Score : 7.2Attack Vector: NETWORK
Exploit Score: 1.2Attack Complexity: LOW
Impact Score: 5.9Privileges Required: HIGH
Severity: HIGHUser Interaction: NONE
Vector: AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HScope: UNCHANGED
 Confidentiality: HIGH
 Integrity: HIGH
 Availability: HIGH
  

References:
Resource IdReference
SCAP Repo OVAL Definitionoval:org.secpod.oval:def:28596


OVAL    1
oval:org.secpod.oval:def:28596
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012_R2

© SecPod Technologies