The Desktop/Secure Remote Computing STIGs contain additional requirements for systems used remotely. Note: If a third-party firewall is used, document this with the IAO and mark the Windows firewall settings as Not Applicable. Subkey: \Software\Policies\Microsoft\WindowsFirewall\DomainProfile\ If the following registry value doesn’t exist or is not configured as specified, then this is a finding: Windows 7 Security Technical Implementation Guide The domain profile settings are used when the system is connected to a network that contains domain controllers for the domain of which the computer is a member. This check enables the firewall when connected to the domain.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |