[Forgot Password]
Login  Register Subscribe

24128

 
 

131573

 
 

110139

 
 

909

 
 

85964

 
 

136

Paid content will be excluded from the download.


Download | Alert*
OVAL

Windows Firewall: Public: Inbound connections

ID: oval:org.secpod.oval:def:40272Date: (C)2017-04-25   (M)2018-07-10
Class: COMPLIANCEFamily: windows




This setting determines the behavior for inbound connections that do not match an inbound firewall rule. The default behavior is to block connections unless there are firewall rules to allow the connection. Vulnerability: If the firewall allows all traffic to access the system then an attacker may be more easily able to remotely exploit a weakness in a network service. Counter Measure: Configure this setting to block inbound connections by default. Potential Impact: None, this is the default configuration. Fix: (1) GPO: Computer Configuration\Windows Settings\Security Settings\Windows Firewall with Advanced Security\Windows Firewall with Advanced Security\Windows Firewall Properties\Public Profile\Windows Firewall: Public: Inbound connections (2) REG: NO INFO

Platform:
Microsoft Windows Server 2016
Reference:
CCE-46127-7
CPE    1
cpe:/o:microsoft:windows_server_2016:::x64
CCE    1
CCE-46127-7
XCCDF    4
xccdf_org.secpod_benchmark_general_Windows_Server_2016
xccdf_org.secpod_benchmark_NIST_800_53_r4_Windows_Server_2016
xccdf_org.secpod_benchmark_NIST_800_171_R1_Windows_Server_2016
xccdf_org.secpod_benchmark_PCI_3_2_Windows_Server_2016
...

© SecPod Technologies