UCF STIG Viewer Logo

Windows Firewall with Advanced Security Security Technical Implementation Guide


Overview

Date Finding Count (21)
2018-02-21 CAT I (High): 3 CAT II (Med): 9 CAT III (Low): 9
STIG Description
The Windows Firewall with Advanced Security Security Technical Implementation Guide (STIG) is published as a tool to improve the security of Department of Defense (DoD) information systems. Comments or proposed revisions to this document should be sent via e-mail to the following address: disa.stig_spt@mail.mil.

Available Profiles



Findings (MAC III - Administrative Sensitive)

Finding ID Severity Title
V-17418 High The Windows Firewall with Advanced Security must block unsolicited inbound connections when connected to a domain.
V-17428 High The Windows Firewall with Advanced Security must block unsolicited inbound connections when connected to a private network.
V-17438 High The Windows Firewall with Advanced Security must block unsolicited inbound connections when connected to a public network.
V-17415 Medium The Windows Firewall with Advanced Security must be enabled when connected to a domain.
V-17417 Medium The Windows Firewall with Advanced Security must be enabled when connected to a public network.
V-17416 Medium The Windows Firewall with Advanced Security must be enabled when connected to a private network.
V-17419 Medium The Windows Firewall with Advanced Security must allow outbound connections, unless a rule explicitly blocks the connection when connected to a domain.
V-17443 Medium The Windows Firewall with Advanced Security local connection rules must not be merged with Group Policy settings when connected to a public network.
V-17429 Medium The Windows Firewall with Advanced Security must allow outbound connections, unless a rule explicitly blocks the connection when connected to a private network.
V-17439 Medium The Windows Firewall with Advanced Security must allow outbound connections, unless a rule explicitly blocks the connection when connected to a public network.
V-36440 Medium Inbound exceptions to the firewall on domain workstations must only allow authorized remote management hosts.
V-17442 Medium The Windows Firewall with Advanced Security local firewall rules must not be merged with Group Policy settings when connected to a public network.
V-17445 Low The Windows Firewall with Advanced Security log size must be configured for public network connections.
V-17437 Low The Windows Firewall with Advanced Security must log successful connections when connected to a private network.
V-17425 Low The Windows Firewall with Advanced Security log size must be configured for domain connections.
V-17426 Low The Windows Firewall with Advanced Security must log dropped packets when connected to a domain.
V-17446 Low The Windows Firewall with Advanced Security must log dropped packets when connected to a public network.
V-17447 Low The Windows Firewall with Advanced Security must log successful connections when connected to a public network.
V-17436 Low The Windows Firewall with Advanced Security must log dropped packets when connected to a private network.
V-17435 Low The Windows Firewall with Advanced Security log size must be configured for private network connections.
V-17427 Low The Windows Firewall with Advanced Security must log successful connections when connected to a domain.