Check: SRC-EPT-420
SRC - Remote Endpoint:
SRC-EPT-420
(in version v2 r7)
Title
Host-based firewall wil be configured in a deny-by-default mode for ports and services. (Cat II impact)
Discussion
Configuring the personal firewall to be in deny-by-default posture will ensure only known and needed ports are opened for traffic. (Remote Only)
Check Content
This check verifies that the firewall is configured in a deny by default posture. The method of access to the firewall configuration will vary with the actual software. However, in general, the configuration can be viewed by clicking on the program icon in the desktop tray or by using the Start menu. Select the Configuration or Settings button/option and view the advanced custom settings for the Internet Zone. If the firewall is not in a deny by default posture, this is a finding.
Fix Text
Ensure the firewall is in a deny by default configuration.
Additional Identifiers
Rule ID: SV-6810r1_rule
Vulnerability ID: V-6662
Group Title:
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |