WNFWA-000100 - Inbound exceptions to the firewall on domain workstations must only allow authorized remote management hosts.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Allowing inbound access to domain workstations from other systems may allow lateral movement across systems if credentials are compromised. Limiting inbound connections only from authorized remote management systems will help limit this exposure.

Solution

Ensure firewall exceptions to inbound connections on domain workstations only allow authorized management systems and remote management hosts.

Firewall rules can be complex and should be thoroughly tested before applying in a production environment.

One method for restricting inbound connections is to only allow exceptions for a specific scope of remote IP addresses. For any inbound rules that allow connections from other systems, configure the Scope for Remote IP addresses to those of authorized management systems and remote management hosts. This may be defined as an IP address, subnet, or range. Apply the rule to all firewall profiles.

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_MS_Windows_Firewall_V2R1_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-6(3), CAT|II, CCI|CCI-000067, Rule-ID|SV-242009r698268_rule, STIG-ID|WNFWA-000100, STIG-Legacy|SV-55086, STIG-Legacy|V-36440, Vuln-ID|V-242009

Plugin: Windows

Control ID: 27a60582b0da122e1d85a368977b4098870ab4d4bc35d313551a7e539ab77fe8