SV-55086r1_rule
V-36440
Inbound Firewall Exception for Administration
WNFWA-000100
CAT II
10
Ensure firewall exceptions to inbound connections on domain workstations only allow authorized management systems and remote management hosts.
Firewall rules can be complex and should be thoroughly tested before applying in a production environment.
One method for restricting inbound connections is to only allow exceptions for a specific scope of remote IP addresses. For any inbound rules that allow connections from other systems, configure the Scope for Remote IP addresses to those of authorized management systems and remote management hosts. This may be defined as an IP address, subnet, or range. Apply the rule to all firewall profiles.
This requirement is NA for servers and non domain workstations.
Verify firewall exceptions for inbound connections on domain workstations only allow authorized management systems and remote management hosts.
Review inbound firewall exception rules in Windows Firewall with Advanced Security. Firewall rules can be complex and should be reviewed with the firewall administrator.
One method for restricting inbound connections is to only allow exceptions for a specific scope of remote IP addresses.
If allowed inbound exceptions are not limited to authorized management systems and remote management hosts, this is a finding.
V-36440
False
WNFWA-000100
This requirement is NA for servers and non domain workstations.
Verify firewall exceptions for inbound connections on domain workstations only allow authorized management systems and remote management hosts.
Review inbound firewall exception rules in Windows Firewall with Advanced Security. Firewall rules can be complex and should be reviewed with the firewall administrator.
One method for restricting inbound connections is to only allow exceptions for a specific scope of remote IP addresses.
If allowed inbound exceptions are not limited to authorized management systems and remote management hosts, this is a finding.
M
2565