Shows all known insecure services, protocols and ports, according to known standards, used on endpoints |
As a part of documenting of business justification of usage of insecure protocols (PCI DSS 1.1.6), this query will display a list of insecure ports, services and protocols used on each endpoint and help you document justifications of their usage. As a guidance on services, ports and protocols considered to be insecure, refer to industry standards, such as NIST. If insecure services, protocols, or ports are needed for the organization, the knowns risks of these protocols must be estimated and approved by the organization, the use of the protocol should be justified, and the security mechanisms that enable these protocols to be used safely must be deplyed and maintained.
Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on 1.1.6.c: Insecure Services, Protocols, Ports created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.
Endpoint configuration management in the Cloud
Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'.
Get results instantly from live systems and run automated actions.
Related Alerts and Reports:
1.1.1.b: All Network Connections
Pulls a list of all network connections configured on the endpoints
1.1.1.c: Desktop Firewall Configurations
View current configuration of Windows Firewall on multiple computers at once
1.1.2.a: Diagram of Network Connections
View all network connections between Cardholder Data Environment and other networks
1.1.4.c: Verify Firewall is Active
Check status of desktop firewall on all the workstations at once
1.1.6.a: All Services, Protocols, Ports
View all services, protocols and ports used on all the endpoints
1.1.7.b: Review of Firewall Rules Every 6 Months
Enables streamlined review of all active desktop firewall rules at predetermined regular intervals
Find more information on 1.1.6.c: Insecure Services, Protocols, Ports at Microsoft TechNet.