| Nov 8, 2024 Functional Update1.1.1 Ensure 'Login Banner' is set1.1.2 Ensure 'Enable Log on High DP Load' is enabled1.2.1 Ensure 'Permitted IP Addresses' is set to those necessary for device management1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - HTTPS1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SNMP1.2.2 Ensure 'Permitted IP Addresses' is set for all management profiles where SSH, HTTPS, or SNMP is enabled - SSH1.2.3 Ensure HTTP and Telnet options are disabled for the Management Interface1.3.1 Ensure 'Minimum Password Complexity' is enabled1.3.10 Ensure 'Block Username Inclusion' is enabled1.3.11 Ensure 'New Password Differs by Characters' is greater than or equal to 31.3.2 Ensure 'Minimum Length' is greater than or equal to 121.3.3 Ensure 'Prevent Password Reuse Limit' is set to 24 or more passwords1.3.4 Ensure 'Required Password Change Period' is less than or equal to 90 days1.3.5 Ensure 'Password Profiles' do not exist1.3.6 Ensure 'Minimum Uppercase Letters' is greater than or equal to 11.3.7 Ensure 'Minimum Lowercase Letters' is greater than or equal to 11.3.8 Ensure 'Minimum Numeric Letters' is greater than or equal to 11.3.9 Ensure 'Minimum Special Characters' is greater than or equal to 11.4.1 Ensure 'Idle timeout' is less than or equal to 10 minutes for device management1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Failed Attempts1.4.2 Ensure 'Failed Attempts' and 'Lockout Time' for Authentication Profile are properly configured - Lockout Time1.5.1 Ensure 'V3' is selected for SNMP polling1.6.1 Ensure 'Verify Update Server Identity' is enabled1.6.2 Ensure redundant NTP servers are configured appropriately1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - Certificates1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect Gateways1.6.3 Ensure that the certificate securing Remote Access VPNs is valid - GlobalProtect Portals2.3 Ensure that User-ID is only enabled for internal trusted interfaces2.4 Ensure that 'Include/Exclude Networks' is used if User-ID is enabled2.5 Ensure that the User-ID Agent has minimal permissions if User-ID is enabled2.6 Ensure that the User-ID service account does not have interactive logon rights2.7 Ensure remote access capabilities for the User-ID service account are forbidden.2.8 Ensure that security policies restrict User-ID Agent traffic from crossing into untrusted zones3.1 Ensure a fully-synchronized High Availability peer is configured3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Enabled3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Link Monitoring Failure Condition3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Enabled3.2 Ensure 'High Availability' requires Link Monitoring and/or Path Monitoring - Path Monitoring Failure Condition3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Election Settings3.3 Ensure 'Passive Link State' and 'Preemptive' are configured appropriately - Passive Link State4.1 Ensure 'Antivirus Update Schedule' is set to download and install updates hourly4.2 Ensure 'Applications and Threats Update Schedule' is set to download and install updates daily5.1 Ensure that WildFire file size upload limits are maximized5.2 Ensure forwarding is enabled for all applications and file types in WildFire file blocking profiles5.3 Ensure a WildFire file blocking profile is enabled for all security policies allowing Internet traffic flows5.4 Ensure forwarding of decrypted content to WildFire is enabled5.5 Ensure all WildFire session information settings are enabled5.6 Ensure alerts are enabled for malicious files detected by WildFire5.7 Ensure 'WildFire Update Schedule' is set to download and install updates every 15 minutes6.1 Ensure at least one antivirus profile is set to block on all decoders except 'imap' and 'pop3'6.10 Ensure that URL Filtering uses the action of 'block' or 'override' on the URL categories6.11 Ensure that access to every URL is logged6.12 Ensure all HTTP Header Logging options are enabled - Log Container Page6.12 Ensure all HTTP Header Logging options are enabled - Referer6.12 Ensure all HTTP Header Logging options are enabled - User-Agent6.12 Ensure all HTTP Header Logging options are enabled - X-Forwarded-For6.13 Ensure secure URL filtering is enabled for all security policies allowing traffic to the Internet6.14 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled - Data Filtering Profile6.14 Ensure alerting after a threshold of credit card or Social Security numbers is detected is enabled - Data Object6.15 Ensure a secure Data Filtering profile is applied to all security policies allowing traffic to or from the Internet6.16 Ensure that a Zone Protection Profile with an enabled SYN Flood Action of SYN Cookies is attached to all untrusted zones6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set actions6.19 Ensure all zones have Zone Protection Profiles that drop specially crafted packets6.2 Ensure a secure antivirus profile is applied to all relevant security policies6.3 Ensure an anti-spyware profile is configured to block on all spyware severity levels, categories, and threats6.4 Ensure DNS sinkholing is configured on all anti-spyware profiles in use6.5 Ensure passive DNS monitoring is set to enabled on all anti-spyware profiles in use6.6 Ensure a secure anti-spyware profile is applied to all security policies permitting traffic to the Internet6.7 Ensure a Vulnerability Protection Profile is set to block attacks against critical/high, and set to default on medium, low, and info6.8 Ensure a secure Vulnerability Protection Profile is applied to all security rules allowing traffic7.1 Ensure application security policies exist when allowing traffic from an untrusted zone to a more trusted zone7.2 Ensure 'Service setting of ANY' in a security policy allowing traffic does not exist8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is configured - Invalid Categories8.1 Ensure 'SSL Forward Proxy Policy' for traffic destined to the Internet is configured - Policies8.2 Ensure 'SSL Inbound Inspection' is required for all untrusted traffic destined for servers using SSL or TLS8.3 Ensure that the Certificate used for Decryption is Trusted
MiscellaneousMetadata updated.References updated.Variables updated.
 | 
| Jul 9, 2024 Functional Update6.18 Ensure that all zones have Zone Protection Profiles with all Reconnaissance Protection settings enabled, tuned, and set actions
 | 
| Jun 17, 2024 | 
| Dec 22, 2023 | 
| Mar 7, 2023 MiscellaneousMetadata updated.References updated.
 | 
| Jan 4, 2023 | 
| Dec 7, 2022 | 
| Apr 25, 2022 | 
| Mar 29, 2022 MiscellaneousMetadata updated.References updated.
 | 
| Jun 17, 2021 MiscellaneousMetadata updated.References updated.
 |