[Forgot Password]
Login  Register Subscribe

24128

 
 

131615

 
 

112965

 
 

909

 
 

87854

 
 

136

 
 
Paid content will be excluded from the download.

Filter
Matches : 87821 Download | Alert*

Requirement : 2.3.c Verify that administrator access to the web-based management interfaces is encrypted with strong cryptography.

The Screen Saver timeout setting should be configured correctly.

The Screen Saver timeout setting should be configured correctly.

The Password protect the screen saver setting should be configured correctly.

The Password protect the screen saver setting should be configured correctly.

The "Set time limit for idle sessions" policy should be set correctly for Terminal Services.

Enable only necessary and secure services, protocols, daemons,etc.as required for the function of the system.

Verify that the proper encryption strength is implemented for the encryption methodology in use. (Check vendor recommendations/best practices.)

Verify that the protocol is implemented to use only secure configurations, and does not support insecure versions or configurations.

Implement security features for any required services, protocols or daemons that are considered to be insecure for example, use secured technologies such as SSH, S-FTP, SSL, or IPSec VPN to protect insecure services such as NetBIOS, file-sharing, Telnet, FTP, etc.


Pages:      Start    8743    8744    8745    8746    8747    8748    8749    8750    8751    8752    8753    8754    8755    8756    ..   8782

© SecPod Technologies