[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

IP address range Exclusions

ID: oval:org.secpod.oval:def:27712Date: (C)2015-10-08   (M)2023-07-04
Class: COMPLIANCEFamily: windows




This policy, if defined, will prevent network protection against exploits of known vulnerabilities from inspecting the specified IP addresses. IP addresses should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of an IP address range. As an example, a range might be defined as: 157.1.45.123-60.1.1.1. The value is not used and it is recommended that this be set to 0. If you configure this setting, you can prevent exploits that are performed on specific IP address ranges. If you do not configure this setting, you cannot prevent exploits that are performed on specific IP address ranges. Fix: (1) GPO: Computer Configuration\Administrative Templates\Windows Components\Windows Defender\Network Inspection System Exclusions!IP address range Exclusions (2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\NIS\Consumers\IPS\Exclusions\IP Ranges!Nis_Consumers_IPS_Exclusions_Ip_Ranges_Ip_Range

Platform:
Microsoft Windows Server 2012 R2
Reference:
CCE-36945-4
CPE    1
cpe:/o:microsoft:windows_server_2012::r2:x64
CCE    1
CCE-36945-4
XCCDF    1
xccdf_org.secpod_benchmark_general_Windows_2012_R2

© SecPod Technologies