Shows all known insecure services, protocols and ports, according to known standards, used on endpoints |
As a part of documenting of business justification of usage of insecure protocols (PCI DSS 1.1.6), this query will display a list of insecure ports, services and protocols used on each endpoint and help you document justifications of their usage. As a guidance on services, ports and protocols considered to be insecure, refer to industry standards, such as NIST. If insecure services, protocols, or ports are needed for the organization, the knowns risks of these protocols must be estimated and approved by the organization, the use of the protocol should be justified, and the security mechanisms that enable these protocols to be used safely must be deplyed and maintained.
Sign-up for Action1 Free Edition to streamline compliance efforts for your network of endpoints. Such as you can simplify assessments of 1.1.6.c: Insecure Services, Protocols, Ports for your internal or external auditors, create instant or regular compliance reports that prove your compliance while reducing the costs. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints within seconds and allows you to pass compliance audits and maintain continuous compliance with ease.
Respond to Threatsin Real-Time
Ask questions in plain English such as "list of installed software" or "all running processes".
Get answers instantly from live systems or subscribe to real-time alerts.
Related Alerts and Reports:
1.1.1.b: All Network Connections
Pulls a list of all network connections configured on the endpoints
1.1.1.c: Desktop Firewall Configurations
View current configuration of Windows Firewall on multiple computers at once
1.1.2.a: Diagram of Network Connections
View all network connections between Cardholder Data Environment and other networks
1.1.4.c: Verify Firewall is Active
Check status of desktop firewall on all the workstations at once
1.1.6.a: All Services, Protocols, Ports
View all services, protocols and ports used on all the endpoints
1.1.7.b: Review of Firewall Rules Every 6 Months
Enables streamlined review of all active desktop firewall rules at predetermined regular intervals
Keywords: Shows all known insecure services, protocols and ports, according to known standards, used on endpoints,Action1 1.1.6.c: Insecure Services, Protocols, Ports.
Find more information on 1.1.6.c: Insecure Services, Protocols, Ports at Microsoft TechNet.