Make sure that endpoints do not use default passwords to connect to wireless access points |
If wireless access points are configured with default or empty passwords, hackers can use wireless sniffers to capture the wireless traffic, extract plain text passwords and other sensitive information that can be used to attack the network.
Action1 automates assessment of wireless connection settings on each endpoint within the CDE to make sure no connections are made using default or empty wireless passwords. This adds the additional layer of protection to catch wireless access points no detected during network equipment assessment.
Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on 2.1.1.c: Default Passwords for Access Points created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.
Endpoint configuration management in the Cloud
Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'.
Get results instantly from live systems and run automated actions.
Related Alerts and Reports:
2.1.a: Default Passwords
Verify that that no endpoint uses vendor-supplied default accounts and passwords
2.1.b: Unnecessary Default Accounts
Verify that all unnecessary default accounts are disable or removed
2.1.1.d: Strong Encryption for Wireless Connections
Examine all wireless connections to verify that no weak protocols are used to connect to wireless access points
Find more information on 2.1.1.c: Default Passwords for Access Points at Microsoft TechNet.