Free Tool: 1.1.2.a: Diagram of Network Connections


View all network connections between Cardholder Data Environment and other networks



 









Action1 Customers
1.1.2.a: Diagram of Network Connections   View all network connections between Cardholder Data Environment and other networks


As a part of examination and observation of network configurations (PCI DSS 1.1.2), this query shows all connections between endpoints within cardholder data environment and other networks, including wireless networks. This will help to identify the location of all network devices and create a diagram to document how they are configured.

Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on 1.1.2.a: Diagram of Network Connections created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.



 



Endpoint configuration management in the Cloud

Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'.
Get results instantly from live systems and run automated actions.


1.1.2.a: Diagram of Network Connections
 




Related Alerts and Reports:

1.1.1.b: All Network Connections
    Pulls a list of all network connections configured on the endpoints
1.1.1.c: Desktop Firewall Configurations
    View current configuration of Windows Firewall on multiple computers at once
1.1.4.c: Verify Firewall is Active
    Check status of desktop firewall on all the workstations at once
1.1.6.a: All Services, Protocols, Ports
    View all services, protocols and ports used on all the endpoints
1.1.6.c: Insecure Services, Protocols, Ports
    Shows all known insecure services, protocols and ports, according to known standards, used on endpoints
1.1.7.b: Review of Firewall Rules Every 6 Months
    Enables streamlined review of all active desktop firewall rules at predetermined regular intervals


Find more information on 1.1.2.a: Diagram of Network Connections at Microsoft TechNet.