Free Alerts and Reports: 1.1.2.a: Diagram of Network Connections


View all network connections between Cardholder Data Environment and other networks




 









Action1 Customers
1.1.2.a: Diagram of Network Connections   View all network connections between Cardholder Data Environment and other networks


As a part of examination and observation of network configurations (PCI DSS 1.1.2), this query shows all connections between endpoints within cardholder data environment and other networks, including wireless networks. This will help to identify the location of all network devices and create a diagram to document how they are configured.

Sign-up for Action1 Free Edition to streamline compliance efforts for your network of endpoints. Such as you can simplify assessments of 1.1.2.a: Diagram of Network Connections for your internal or external auditors, create instant or regular compliance reports that prove your compliance while reducing the costs. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints within seconds and allows you to pass compliance audits and maintain continuous compliance with ease.



 



Respond to Threatsin Real-Time

Ask questions in plain English such as "list of installed software" or "all running processes".
Get answers instantly from live systems or subscribe to real-time alerts.


1.1.2.a: Diagram of Network Connections
 




Related Alerts and Reports:

1.1.1.b: All Network Connections
    Pulls a list of all network connections configured on the endpoints
1.1.1.c: Desktop Firewall Configurations
    View current configuration of Windows Firewall on multiple computers at once
1.1.4.c: Verify Firewall is Active
    Check status of desktop firewall on all the workstations at once
1.1.6.a: All Services, Protocols, Ports
    View all services, protocols and ports used on all the endpoints
1.1.6.c: Insecure Services, Protocols, Ports
    Shows all known insecure services, protocols and ports, according to known standards, used on endpoints
1.1.7.b: Review of Firewall Rules Every 6 Months
    Enables streamlined review of all active desktop firewall rules at predetermined regular intervals


Keywords: View all network connections between Cardholder Data Environment and other networks,Action1 1.1.2.a: Diagram of Network Connections.

Find more information on 1.1.2.a: Diagram of Network Connections at Microsoft TechNet.