2.2: Configuration Standards and System Hardening


Develop configuration standards for all system components to address all known security vulnerabilities



  

Fully functional free edition for up to 10 endpoints with no expiration date. More details >







Trusted by Thousands of Customers Worldwide:
Action1 Customers
All operating systems have known weakness, but there are also know ways to address them and make the systems secure. A number of security organizations have developed system hardening guidelines to advise organizations how to correct such vulnerabilities. Action1 includes system hardening framework developed by Center for Internet Security (CIS) and provides automated assessment technology to verify that your endpoints are configured per CIS recommendations, wherever it's applicable on the endpoint level.

2.2.2.a: Enabled System Services and Protocols
    Allows to inspect enabled system services and protocols to verify that only necessary services are enabled
2.2.2.b: Insecure System Services and Protocols
    Shows all insecure system services and protocols to verify that their usage is justified per configuration standards
2.2.3: Additional Security Features
    Inspect configuration settings to verify that security features are implemented in insecure services and protocols
2.2.4.c: Common Security Parameters
    Inspect the common security parameters to verify that they are set per security standards
2.2.5.a: Unnecessary Functionality is Removed
    Inspect the configurations to verify that all unnecessary functionality is removed, such as drivers and features


Latest Release: Action1 Endpoint Security Platform 2.2, May 4, 2020.
For more information, please refer to Action1 Online Documentation



Achieve More With Our Integrations and RESTful API


Action1 provides RESTful API and integrates with the following systems so you can get most out of your deployment:

Action1 Integrations




Hundreds of Organizations Worldwide Use Action1 Platform



Community College in Texas

Our students love technology. But sometimes they break it too. Action1 allows us to understand all abnormal activities happening on college computers.

Community College in Texas

European Construction Conglomerate

Action1 plays a critical role in our cybersecurity strategy. The ability to instantly understand what is happening on your endpoints is priceless.

European Construction Conglomerate

City Government in Georgia

Our city prides on being one of the most digitally transformed cities in the region. Without Action1, the risks of managing the infrastructure were too high.

City Government in Georgia

By continuing to use our website, you agree with our use of cookies in accordance with our Privacy Policy. You can reject cookies by changing your browser settings.     
Ok, got it