Check: SRC-EPT-410
SRC - Remote Endpoint:
SRC-EPT-410
(in version v2 r7)
Title
The host-based firewall installed on the endpoint device will be configured to a Deny-by-Default posture in accordance with the Ports and Protocols Service Management (PPSM) list. (Cat I impact)
Discussion
Blocking these ports protects the device from denial-of-service attacks. (Remote Only)
Check Content
The method of access to the firewall configuration will vary with the actual software. However, in general, the configuration can be viewed by clicking on the program icon in the desktop tray or by using the Start menu. Select the Configuration or Settings button/option and view the advanced custom settings for the Internet Zone. PPSM. If the personal firewall is not configured for a Deny-by-Default posture, this is a finding.
Fix Text
A Deny-by-Default posture is setup on the personal firewall.
Additional Identifiers
Rule ID: SV-6805r1_rule
Vulnerability ID: V-6659
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |