Host-based firewall wil be configured in a deny-by-default mode for ports and services.

From Remote Endpoint STIG

Part of SRC-EPT-420 Personal firewall deny-by-default

Associated with IA controls: ECSC-1

SV-6810r1_rule Host-based firewall wil be configured in a deny-by-default mode for ports and services.

Vulnerability discussion

Configuring the personal firewall to be in deny-by-default posture will ensure only known and needed ports are opened for traffic. (Remote Only)

Check content

This check verifies that the firewall is configured in a deny by default posture. The method of access to the firewall configuration will vary with the actual software. However, in general, the configuration can be viewed by clicking on the program icon in the desktop tray or by using the Start menu. Select the Configuration or Settings button/option and view the advanced custom settings for the Internet Zone. If the firewall is not in a deny by default posture, this is a finding.

Fix text

Ensure the firewall is in a deny by default configuration.

Pro Tips

Lavender hyperlinks in small type off to the right (of CSS class id, if you view the page source) point to globally unique URIs for each document and item. Copy the link location and paste anywhere you need to talk unambiguously about these things.

You can obtain data about documents and items in other formats. Simply provide an HTTP header Accept: text/turtle or Accept: application/rdf+xml.

Powered by sagemincer