Free Tool: 2.1.1.c: Default Passwords for Access Points


Make sure that endpoints do not use default passwords to connect to wireless access points



 









Action1 Customers
2.1.1.c: Default Passwords for Access Points   Make sure that endpoints do not use default passwords to connect to wireless access points


If wireless access points are configured with default or empty passwords, hackers can use wireless sniffers to capture the wireless traffic, extract plain text passwords and other sensitive information that can be used to attack the network.

Action1 automates assessment of wireless connection settings on each endpoint within the CDE to make sure no connections are made using default or empty wireless passwords. This adds the additional layer of protection to catch wireless access points no detected during network equipment assessment.

Sign-up for Action1 Free Edition to receive real-time alerts and view instant data from your endpoints, such as alert on 2.1.1.c: Default Passwords for Access Points created, deleted or modified or run live or scheduled queries with the ability to export to CSV or Excel. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints in seconds and you can query your entire network in plain English.



 



Endpoint configuration management in the Cloud

Manage endpoint configuration using plain English from the Cloud. Such as type 'Windows services' or 'reboot computer'.
Get results instantly from live systems and run automated actions.


2.1.1.c: Default Passwords for Access Points
 




Related Alerts and Reports:



Find more information on 2.1.1.c: Default Passwords for Access Points at Microsoft TechNet.