References (Active)
Clear All Name Audit Name Plugin Category 2.3.2 Allow only trusted hosts in SNMPv3 CIS Fortigate 7.0.x v1.3.0 L2 FortiGate CONFIGURATION MANAGEMENT , SYSTEM AND COMMUNICATIONS PROTECTION
2.7 Ensure internal sources are blocked on external networks CIS Juniper OS Benchmark v2.1.0 L2 Juniper SYSTEM AND COMMUNICATIONS PROTECTION , SYSTEM AND INFORMATION INTEGRITY
3.3 Ensure firewall policy denying all traffic to/from Tor, malicious server, or scanner IP addresses using ISDB CIS Fortigate 7.0.x v1.3.0 L1 FortiGate ACCESS CONTROL , CONFIGURATION MANAGEMENT , CONTINGENCY PLANNING , PLANNING , PROGRAM MANAGEMENT , SYSTEM AND SERVICES ACQUISITION , SYSTEM AND COMMUNICATIONS PROTECTION
3.10 Ensure SharePoint database servers are segregated from application server and placed in a secure zone. CIS Microsoft SharePoint 2019 OS v1.0.0 Windows SYSTEM AND INFORMATION INTEGRITY
3.12 Ensure Anti-Spoofing is enabled and action is set to Prevent for all Interfaces CIS Check Point Firewall L2 v1.1.0 CheckPoint CONFIGURATION MANAGEMENT , SYSTEM AND INFORMATION INTEGRITY
6.1.1 Apply a Trusted Signed Certificate for VPN Portal CIS Fortigate 7.0.x v1.3.0 L2 FortiGate ACCESS CONTROL , CONFIGURATION MANAGEMENT