This infrastructure security audit examined 69 components and identified 950 findings across various severity levels.
The overall security posture is rated as CRITICAL. Immediate action is required to prevent potential system compromise.
17 system(s) are exposed to immediate compromise risk based on critical findings.
Estimated remediation timeline: 24-48 hours for critical issues, 7 days for high-priority items.
See the Recommendations section for detailed remediation guidance.
The following infrastructure components were analyzed during this audit. Click any component to view its findings.
Real-time health status for Exchange Server infrastructure.
Importance:
Active Directory is the core identity and access management service. This audit examines users, groups, organizational units, Group Policy Objects, replication health, trust relationships, and security configurations.
Importance: Critical infrastructure component that controls authentication and authorization for the entire organization.
AD CS provides public key infrastructure (PKI) capabilities including certificate issuance, revocation, and management. This audit examines certificate authorities, templates, and known vulnerabilities (ESC1-ESC7).
Importance: Compromised certificate services can lead to domain-wide privilege escalation.
AD FS provides single sign-on capabilities for federated identity scenarios. This audit examines certificate configurations, relying party trusts, claims rules, and security settings.
Importance: Federation services are critical for secure authentication to cloud and partner applications.
Importance:
Apache HTTPD security audit covering ServerTokens, directory security, SSL configuration, mod_security, and access controls.
Importance: Apache remains one of the most deployed web servers requiring careful security configuration.
Importance:
Brocade Fibre Channel SAN switch security audit examining fabric security mode, zoning configuration, ISL security, DCC policy, and default zone settings.
Importance: SAN switches control access to storage infrastructure and require strict security controls.
Importance:
Importance:
Cisco IOS device security audit covering VTY line security, AAA configuration, SNMP settings, enabled services, logging, ACLs, and configuration management.
Importance: Cisco network devices form the backbone of many enterprise networks and must be properly secured.
Cisco MDS SAN switch security audit covering zone security, fabric binding, FC port security, management protocols, and FLOGI database analysis.
Importance: MDS switches protect storage networks and must be secured against unauthorized access.
Cisco NX-OS security audit examining vPC configuration, Control Plane Policing (CoPP), RBAC roles, enabled features, password security, and logging configuration.
Importance: Nexus switches handle datacenter traffic and require enterprise-grade security controls.
Importance:
Importance:
Importance:
DHCP provides automatic IP address assignment. This audit examines scopes, leases, reservations, failover configurations, and authorization status.
Importance: DHCP security prevents rogue address assignment and network attacks.
DNS provides name resolution services essential for network operations. This audit examines zones, records, forwarders, dynamic update security, and DNSSEC configuration.
Importance: DNS vulnerabilities can enable man-in-the-middle attacks and service disruption.
Docker security audit covering daemon configuration, privileged containers, capabilities, volume mounts, image security, and socket exposure.
Importance: Container security is critical as misconfigured containers can compromise the host system.
Elasticsearch security audit covering X-Pack security, authentication, TLS configuration, network binding, and cluster health.
Importance: Search clusters often contain aggregated sensitive data from multiple sources.
Event log analysis for security monitoring. This audit examines security events, logon patterns, PowerShell activity, and audit policy.
Importance: Event logs are essential for threat detection and forensic investigation.
Exchange Server provides email, calendar, and collaboration services. This audit examines mailbox configurations, transport rules, DAG health, virtual directories, and security settings.
Importance: Email is a primary attack vector and contains sensitive organizational communications.
File servers store organizational data and documents. This audit examines share permissions, SMB configurations, DFS replication, quotas, and storage utilization.
Importance: Improper file server security can lead to data breaches and ransomware attacks.
FortiGate firewall security audit examining firewall policies, UTM profiles (AV, IPS, Web Filter), VPN configuration, FortiGuard connectivity, and admin security.
Importance: FortiGate firewalls protect network perimeters and internal segments from threats.
Importance:
Importance:
HAProxy security audit examining stats page exposure, SSL termination, ACL rules, rate limiting, and backend health check security.
Importance: Load balancers control traffic flow and can expose backend systems if misconfigured.
HPE Integrated Lights-Out (iLO) security audit via Redfish API covering user accounts, network protocols, IPMI, directory integration, and firmware status.
Importance: BMC/iLO interfaces provide out-of-band management and must be secured to prevent physical compromise.
HPE switch security audit covering management access, SNMP configuration, AAA settings, port security, DHCP snooping, and spanning tree protection.
Importance: HPE switches are widely deployed in enterprise networks and require proper security hardening.
Hyper-V provides server virtualization. This audit examines virtual machines, virtual switches, storage, replication, and security configurations.
Importance: Virtualization security is critical as VM escape can compromise the entire host.
Internet Information Services provides web hosting. This audit examines websites, application pools, SSL certificates, authentication, and security configurations.
Importance: Web servers are directly exposed to attacks and require careful security configuration.
Importance:
Juniper JunOS security audit covering user authentication, SSH configuration, SNMP security, logging, NTP, management restrictions, and routing protocol security.
Importance: Juniper devices provide critical routing and security functions in enterprise networks.
Kubernetes security audit examining RBAC configuration, pod security, network policies, secrets management, and admission controllers.
Importance: Kubernetes orchestrates containerized workloads and requires comprehensive security controls.
Importance:
Linux server security audit covering SSH configuration, firewall rules, user accounts, SUID/SGID binaries, kernel parameters, and security frameworks (SELinux/AppArmor).
Importance: Linux servers often host critical applications and databases requiring hardened configurations.
Importance:
MikroTik RouterOS security audit examining IP services, MAC server, neighbor discovery, firewall rules, user accounts, and package management.
Importance: MikroTik devices are powerful but often misconfigured, making security audits essential.
MongoDB security audit covering authentication, authorization, network binding, TLS configuration, and access control settings.
Importance: NoSQL databases like MongoDB are frequent targets due to common misconfigurations.
SQL Server provides database services. This audit examines instances, databases, logins, security configurations, and known vulnerabilities.
Importance: Databases contain sensitive business data and are high-value targets.
MySQL/MariaDB security audit examining anonymous accounts, root access, password policies, SSL configuration, and privilege assignments.
Importance: MySQL powers many web applications and requires proper security hardening.
Importance:
Nginx security audit examining SSL/TLS configuration, security headers, certificate expiration, rate limiting, and access controls.
Importance: Web servers are directly exposed to the internet and must be properly hardened.
NPS provides RADIUS authentication and authorization. This audit examines RADIUS clients, network policies, connection request policies, and authentication methods.
Importance: NPS controls network access for VPN, wireless, and wired 802.1X authentication.
Importance:
NVIDIA/Mellanox switch security audit for Onyx and Cumulus Linux platforms, covering management access, SNMP, AAA configuration, and port security.
Importance: High-performance switches used in data centers require proper security configuration.
Importance:
Oracle Database security audit examining default accounts, password policies, privileges, audit configuration, TNS listener security, and encryption settings.
Importance: Oracle databases store enterprise-critical data and are high-value targets for attackers.
Palo Alto firewall security audit covering security policies, threat prevention profiles, URL filtering, WildFire, SSL decryption, admin authentication, and logging.
Importance: Next-generation firewalls are critical perimeter security controls requiring comprehensive configuration review.
Importance:
PostgreSQL security audit covering authentication methods (pg_hba.conf), SSL configuration, user privileges, extensions, and logging settings.
Importance: PostgreSQL is widely used for web applications and contains sensitive application data.
Print servers manage printing infrastructure. This audit examines printers, drivers, ports, and PrintNightmare mitigations.
Importance: Print services have been targets of critical vulnerabilities (PrintNightmare).
Importance:
Deep reconnaissance of Active Directory configuration including sites, subnets, LAPS deployment, SPNs, printers, ACLs, and DC services.
Importance: Identifies attack surface and misconfigurations commonly exploited by attackers.
Redis security audit examining authentication, ACL configuration, protected mode, dangerous commands, TLS, and persistence security.
Importance: In-memory data stores can expose session data and cached credentials if unsecured.
Importance:
Importance:
Importance:
Deep security analysis covering delegation attacks, Kerberos configuration, NTLM settings, GPO security, and advanced threat indicators.
Importance: Identifies advanced security risks and attack paths in the environment.
Importance:
Enterprise storage array security audit (NetApp, Dell EMC, Pure Storage, HPE) covering authentication, network protocols, encryption at rest, snapshot policies, and KMIP integration.
Importance: Storage systems hold critical business data and require comprehensive security hardening.
Importance:
Tape library security audit (IBM, HPE, Quantum, Dell) examining access control, tape encryption, key management (KMIP/EKM), network protocols, and maintenance status.
Importance: Tape libraries are critical for backup and compliance, requiring proper encryption and access controls.
Ubiquiti device security audit (UniFi, EdgeSwitch, EdgeRouter) covering default credentials, firewall rules, SNMP configuration, and management access.
Importance: Ubiquiti devices are common in SMB environments and must be properly secured.
Veeam provides backup and disaster recovery. This audit examines backup jobs, repositories, replication, encryption, and backup status.
Importance: Backup infrastructure is critical for ransomware recovery and business continuity.
Importance:
VMware provides enterprise virtualization. This audit examines ESXi hosts, virtual machines, datastores, networking, and security configurations.
Importance: VMware infrastructure hosts critical workloads and requires comprehensive security.
Comprehensive Windows operating system security audit covering updates, services, firewall, local users, security settings, BitLocker, Defender, scheduled tasks, audit policy, and PowerShell configuration.
Importance: Windows servers and workstations are primary targets and require comprehensive hardening.
Importance:
Security posture assessment for encryption, authentication, certificate management, and protocol compliance across all audited components.
Excellent security posture. Minor improvements recommended.
Click any component to view detailed security analysis and related findings.
Visual representation of discovered network devices and their connections based on LLDP, MAC tables, and neighbor discovery data.
Detailed list of network connections discovered during the audit.
| Source Device | Source Port | Destination Device | Destination Port | Link Type | Speed |
|---|
Consolidated MAC address table from all audited network devices.
| MAC Address | VLAN | Port | Device | Type |
|---|
Complete list of 950 findings sorted by severity.
| # | Severity | Category | Title | Description | Remediation | Affected Items |
|---|---|---|---|---|---|---|
| 1 | Critical | AD | Kerberoastable Service Accounts | 15 service accounts have SPNs set with weak encryption, vulnerable to Kerberoasting. | Use gMSA or enforce AES256 encryption for service accounts. | svc_backup, svc_sql, svc_web, svc_exchange, svc_sharepoint |
| 2 | Critical | Storage | Storage Array Default Admin | Storage arrays using factory default admin credentials. | Change default admin passwords. | netapp01, purestorage01 |
| 3 | Critical | DellIDRAC | Dell iDRAC Default Password | iDRAC using factory default password. | Change default iDRAC password. | srv04-idrac, srv05-idrac |
| 4 | Critical | PostgreSQL | PostgreSQL Trust Authentication | PostgreSQL using trust authentication allowing passwordless connections. | Change pg_hba.conf to use md5 or scram-sha-256 authentication. | pg-primary, pg-replica01 |
| 5 | Critical | Veeam | Unencrypted Backup Jobs | Veeam backup jobs not using encryption for backup data. | Enable encryption on backup jobs with strong passwords. | Backup Job - Production, Backup Job - Database |
| 6 | Critical | BIND | Open DNS Recursion | DNS server allows recursive queries from any source. | Restrict recursion to trusted networks with allow-recursion. | dns01.contoso.local, dns02.contoso.local |
| 7 | Critical | Kubernetes | Kubernetes cluster-admin Binding | ClusterRoleBinding grants cluster-admin to service accounts. | Remove unnecessary cluster-admin bindings and use least privilege. | default:default, kube-system:default |
| 8 | Critical | MongoDB | MongoDB Authentication Disabled | MongoDB instances running without authentication enabled. | Enable authentication with --auth flag and create admin users. | mongo01, mongo02 |
| 9 | Critical | HPEiLO | Default BMC Credentials | Server BMC/iLO using factory default credentials. | Change default passwords and integrate with directory services. | srv01-ilo, srv02-ilo, srv03-ilo |
| 10 | Critical | MSSQL | SA Account Enabled with Weak Password | SQL Server SA account enabled with default or weak password. | Disable SA account or set complex password and use Windows auth. | SQL01, SQL02, SQL03 |
| 11 | Critical | ADCS | ESC1 Vulnerable Certificate Template | Certificate template allows enrollee to supply subject with overly permissive enrollment. | Remove 'Supply in request' option and restrict enrollment. | WebServerEnrollment, UserCertAuto |
| 12 | Critical | Docker | Docker Socket Exposed | Docker socket exposed without TLS, allowing unauthorized container control. | Enable TLS on Docker daemon and restrict socket access. | docker-host01, docker-host02 |
| 13 | Critical | Exchange | Open SMTP Relay | Exchange accepts mail relay from unauthenticated sources. | Configure receive connectors to require authentication. | EX01.contoso.local |
| 14 | Critical | FileServer | SMB1 Protocol Enabled | Legacy SMB1 protocol enabled on file servers, vulnerable to EternalBlue. | Disable SMB1 using Set-SmbServerConfiguration -EnableSMB1Protocol $false | FS01, FS02, FS03 |
| 15 | Critical | NetworkDevice | Default SNMP Community String | Network devices using default 'public' or 'private' SNMP communities. | Change SNMP community strings to complex values. | cisco-core01, hpe-sw01, hpe-sw02 |
| 16 | Critical | PaloAlto | Any/Any Security Policy | Firewall has overly permissive any/any security rules. | Remove or restrict any/any rules to specific sources/destinations. | pa-fw01, pa-fw02 |
| 17 | Critical | CiscoIOS | Telnet Enabled on VTY Lines | Cisco switches have Telnet enabled instead of SSH only. | Disable Telnet and enforce SSH with 'transport input ssh'. | cisco-core01, cisco-core02, cisco-access01 |
| 18 | High | OracleDB | Oracle Default Accounts | Oracle database has unlocked default accounts. | Lock all default accounts: ALTER USER xxx ACCOUNT LOCK. | orcl01, orcl02 |
| 19 | High | SupermicroIPMI | Supermicro IPMI Exposed | IPMI accessible from non-management networks. | Restrict IPMI to management VLAN. | sm-ipmi01, sm-ipmi02 |
| 20 | High | CiscoCIMC | Cisco CIMC Telnet Enabled | CIMC has Telnet service enabled. | Disable Telnet and use SSH/HTTPS only. | ucs-c01, ucs-c02 |
| 21 | High | TapeLibrary | Tape Library No Encryption | Tape library not using hardware encryption. | Enable tape encryption with key management. | tape01 |
| 22 | High | BrocadeSAN | Brocade SAN Default Zone | Brocade SAN using default zone allowing all-to-all access. | Implement proper zoning configuration. | san-sw01, san-sw02 |
| 23 | High | XenServer | XenServer No TLS | XenServer management without TLS encryption. | Enable TLS for XenCenter connections. | xen01, xen02 |
| 24 | High | Nutanix | Nutanix CVMs Exposed | Nutanix Controller VMs accessible from untrusted networks. | Restrict CVM access to management network. | ntnx-cvm01, ntnx-cvm02 |
| 25 | High | Proxmox | Proxmox Default Password | Proxmox root using default or weak password. | Change root password to complex value. | pve01, pve02 |
| 26 | High | MySQL | MySQL Root Remote Access | MySQL root user can connect from any host. | Restrict root to localhost with UPDATE mysql.user. | mysql01, mysql02 |
| 27 | High | Nginx | Nginx Default SSL | Nginx using default self-signed certificates. | Install valid CA-signed certificates. | nginx01, nginx02 |
| 28 | High | Redis | Redis No Authentication | Redis instances accessible without password. | Enable requirepass in redis.conf. | redis01, redis02 |
| 29 | High | CiscoIOS | SSH Version 1 Enabled | Network devices supporting deprecated SSH protocol version 1. | Disable SSHv1 with 'ip ssh version 2'. | cisco-access01, cisco-access02 |
| 30 | High | CiscoIOS | No AAA Authentication | Cisco switches not using AAA for authentication. | Configure AAA with TACACS+ or RADIUS. | cisco-access03, cisco-access04 |
| 31 | High | IIS | TLS 1.0/1.1 Enabled | Web servers supporting deprecated TLS versions. | Disable TLS 1.0/1.1 and enforce TLS 1.2+. | WEB01, WEB02, WEB03 |
| 32 | High | FileServer | SMB Signing Not Required | File servers not requiring SMB signing. | Enable SMB signing requirement via Group Policy. | FS01, FS02 |
| 33 | High | PaloAlto | WildFire Not Enabled | Palo Alto firewalls not using WildFire for malware analysis. | Enable WildFire on security profiles. | pa-fw01, pa-fw02 |
| 34 | High | Fortinet | FortiGuard Not Connected | FortiGate not receiving FortiGuard updates. | Verify FortiGuard connectivity and license. | fg-fw01 |
| 35 | High | Elasticsearch | Elasticsearch No Security | Elasticsearch cluster without X-Pack security enabled. | Enable X-Pack security and configure authentication. | es-node01, es-node02 |
| 36 | High | HPESwitch | HPE Switch Default SNMP | HPE switches using default SNMP communities. | Change SNMP community strings. | hpe-2930f-01, hpe-2930f-02 |
| 37 | High | VMware | VMware ESXi Outdated | ESXi hosts running outdated versions with known vulnerabilities. | Update ESXi to latest patch level. | esxi01, esxi02 |
| 38 | High | VMware | SSH Enabled on ESXi | ESXi hosts have SSH service enabled. | Disable SSH when not needed for troubleshooting. | esxi01, esxi02, esxi03 |
| 39 | High | NPS | Weak RADIUS Shared Secret | NPS RADIUS clients using weak shared secrets. | Use complex shared secrets of 22+ characters. | AP-01, AP-02, VPN-01 |
| 40 | Medium | Linux | Linux SSH Root Login | Linux servers allow direct root SSH login. | Set PermitRootLogin no in sshd_config. | linux01, linux02, linux03 |
| 41 | Medium | HyperV | Hyper-V CredSSP Migration | Hyper-V using CredSSP for live migration. | Use Kerberos constrained delegation instead. | HV01, HV02 |
| 42 | Medium | AIX | AIX Password Policy Weak | AIX systems with weak password policy settings. | Strengthen password policy in /etc/security/user. | aix01, aix02 |
| 43 | Medium | CiscoMDS | Cisco MDS Port Security Disabled | MDS SAN switches without port security enabled. | Enable FC port security. | mds01, mds02 |
| 44 | Medium | HAProxy | HAProxy Stats Exposed | HAProxy statistics page accessible without authentication. | Add authentication to stats page. | haproxy01 |
| 45 | Medium | Apache | Apache ServerTokens Full | Apache exposing full version information. | Set ServerTokens Prod in httpd.conf. | apache01, apache02 |
| 46 | Medium | LenovoXCC | Lenovo XCC Weak Cipher | XCC using weak SSL/TLS ciphers. | Configure strong cipher suites. | lenovo-xcc01 |
| 47 | Medium | JuniperJunOS | Juniper JunOS SSH Weak Key | JunOS devices using weak SSH host keys. | Regenerate SSH keys with 4096-bit RSA. | juniper-mx01 |
| 48 | Medium | Windows | Windows Updates Pending | Windows servers with pending security updates. | Apply pending Windows updates. | APP01, APP02, WEB01 |
| 49 | Medium | macOS | macOS FileVault Disabled | macOS devices without FileVault encryption. | Enable FileVault disk encryption. | mac01, mac02, mac03 |
| 50 | Low | FreeBSD | FreeBSD Sendmail Enabled | FreeBSD systems running sendmail service. | Disable sendmail if not needed. | fbsd01, fbsd02 |
Comprehensive details for each finding with remediation guidance.
15 service accounts have SPNs set with weak encryption, vulnerable to Kerberoasting.
Use gMSA or enforce AES256 encryption for service accounts.
svc_backup, svc_sql, svc_web, svc_exchange, svc_sharepoint
Storage arrays using factory default admin credentials.
Change default admin passwords.
netapp01, purestorage01
iDRAC using factory default password.
Change default iDRAC password.
srv04-idrac, srv05-idrac
PostgreSQL using trust authentication allowing passwordless connections.
Change pg_hba.conf to use md5 or scram-sha-256 authentication.
pg-primary, pg-replica01
Veeam backup jobs not using encryption for backup data.
Enable encryption on backup jobs with strong passwords.
Backup Job - Production, Backup Job - Database
DNS server allows recursive queries from any source.
Restrict recursion to trusted networks with allow-recursion.
dns01.contoso.local, dns02.contoso.local
ClusterRoleBinding grants cluster-admin to service accounts.
Remove unnecessary cluster-admin bindings and use least privilege.
default:default, kube-system:default
MongoDB instances running without authentication enabled.
Enable authentication with --auth flag and create admin users.
mongo01, mongo02
Server BMC/iLO using factory default credentials.
Change default passwords and integrate with directory services.
srv01-ilo, srv02-ilo, srv03-ilo
SQL Server SA account enabled with default or weak password.
Disable SA account or set complex password and use Windows auth.
SQL01, SQL02, SQL03
Certificate template allows enrollee to supply subject with overly permissive enrollment.
Remove 'Supply in request' option and restrict enrollment.
WebServerEnrollment, UserCertAuto
Docker socket exposed without TLS, allowing unauthorized container control.
Enable TLS on Docker daemon and restrict socket access.
docker-host01, docker-host02
Exchange accepts mail relay from unauthenticated sources.
Configure receive connectors to require authentication.
EX01.contoso.local
Legacy SMB1 protocol enabled on file servers, vulnerable to EternalBlue.
Disable SMB1 using Set-SmbServerConfiguration -EnableSMB1Protocol $false
FS01, FS02, FS03
Network devices using default 'public' or 'private' SNMP communities.
Change SNMP community strings to complex values.
cisco-core01, hpe-sw01, hpe-sw02
Firewall has overly permissive any/any security rules.
Remove or restrict any/any rules to specific sources/destinations.
pa-fw01, pa-fw02
Cisco switches have Telnet enabled instead of SSH only.
Disable Telnet and enforce SSH with 'transport input ssh'.
cisco-core01, cisco-core02, cisco-access01
Oracle database has unlocked default accounts.
Lock all default accounts: ALTER USER xxx ACCOUNT LOCK.
orcl01, orcl02
IPMI accessible from non-management networks.
Restrict IPMI to management VLAN.
sm-ipmi01, sm-ipmi02
CIMC has Telnet service enabled.
Disable Telnet and use SSH/HTTPS only.
ucs-c01, ucs-c02
Tape library not using hardware encryption.
Enable tape encryption with key management.
tape01
Brocade SAN using default zone allowing all-to-all access.
Implement proper zoning configuration.
san-sw01, san-sw02
XenServer management without TLS encryption.
Enable TLS for XenCenter connections.
xen01, xen02
Nutanix Controller VMs accessible from untrusted networks.
Restrict CVM access to management network.
ntnx-cvm01, ntnx-cvm02
Proxmox root using default or weak password.
Change root password to complex value.
pve01, pve02
MySQL root user can connect from any host.
Restrict root to localhost with UPDATE mysql.user.
mysql01, mysql02
Nginx using default self-signed certificates.
Install valid CA-signed certificates.
nginx01, nginx02
Redis instances accessible without password.
Enable requirepass in redis.conf.
redis01, redis02
Network devices supporting deprecated SSH protocol version 1.
Disable SSHv1 with 'ip ssh version 2'.
cisco-access01, cisco-access02
Cisco switches not using AAA for authentication.
Configure AAA with TACACS+ or RADIUS.
cisco-access03, cisco-access04
Web servers supporting deprecated TLS versions.
Disable TLS 1.0/1.1 and enforce TLS 1.2+.
WEB01, WEB02, WEB03
File servers not requiring SMB signing.
Enable SMB signing requirement via Group Policy.
FS01, FS02
Palo Alto firewalls not using WildFire for malware analysis.
Enable WildFire on security profiles.
pa-fw01, pa-fw02
FortiGate not receiving FortiGuard updates.
Verify FortiGuard connectivity and license.
fg-fw01
Elasticsearch cluster without X-Pack security enabled.
Enable X-Pack security and configure authentication.
es-node01, es-node02
HPE switches using default SNMP communities.
Change SNMP community strings.
hpe-2930f-01, hpe-2930f-02
ESXi hosts running outdated versions with known vulnerabilities.
Update ESXi to latest patch level.
esxi01, esxi02
ESXi hosts have SSH service enabled.
Disable SSH when not needed for troubleshooting.
esxi01, esxi02, esxi03
NPS RADIUS clients using weak shared secrets.
Use complex shared secrets of 22+ characters.
AP-01, AP-02, VPN-01
Linux servers allow direct root SSH login.
Set PermitRootLogin no in sshd_config.
linux01, linux02, linux03
Hyper-V using CredSSP for live migration.
Use Kerberos constrained delegation instead.
HV01, HV02
AIX systems with weak password policy settings.
Strengthen password policy in /etc/security/user.
aix01, aix02
MDS SAN switches without port security enabled.
Enable FC port security.
mds01, mds02
HAProxy statistics page accessible without authentication.
Add authentication to stats page.
haproxy01
Apache exposing full version information.
Set ServerTokens Prod in httpd.conf.
apache01, apache02
XCC using weak SSL/TLS ciphers.
Configure strong cipher suites.
lenovo-xcc01
JunOS devices using weak SSH host keys.
Regenerate SSH keys with 4096-bit RSA.
juniper-mx01
Windows servers with pending security updates.
Apply pending Windows updates.
APP01, APP02, WEB01
macOS devices without FileVault encryption.
Enable FileVault disk encryption.
mac01, mac02, mac03
FreeBSD systems running sendmail service.
Disable sendmail if not needed.
fbsd01, fbsd02
Detailed configuration data collected from each audited component. This information is useful for compliance documentation, baseline comparisons, and configuration drift detection.
| Setting | Value | Source |
|---|---|---|
| Domain Functional Level | Windows Server 2016 | Get-ADDomain |
| Forest Functional Level | Windows Server 2016 | Get-ADForest |
| Machine Account QuotaSecurity | 10 | AD Attributes |
| KRBTGT Password AgeSecurity | 185 days | AD Attributes |
| Setting | Value | Source |
|---|---|---|
| Minimum Password Length | 12 | Default Domain Policy |
| Password Complexity | Enabled | Default Domain Policy |
| Password History | 24 | Default Domain Policy |
| Maximum Password Age | 90 days | Default Domain Policy |
| Account Lockout Threshold | 5 | Default Domain Policy |
| Setting | Value | Source |
|---|---|---|
| LDAP SigningSecurity | Require | Group Policy |
| LDAP Channel BindingSecurity | Always | Group Policy |
| Kerberos Armoring | Supported | KDC Configuration |
| Setting | Value | Source |
|---|---|---|
| SSH Version | 2 | show running-config |
| Enable SecretSecurity | Configured (Type 9) | show running-config |
| Service Password Encryption | Enabled | show running-config |
| Logging Buffered | 16384 informational | show running-config |
| Setting | Value | Source |
|---|---|---|
| SNMP CommunitySecurity | public (READ) | show running-config |
| SNMP Trap Host | 10.1.1.100 | show running-config |
| SNMP Version | v2c | show running-config |
| Setting | Value | Source |
|---|---|---|
| Transport Input | ssh | line vty 0 15 |
| Exec Timeout | 5 0 | line vty 0 15 |
| Login Authentication | AAA | line vty 0 15 |
| Setting | Value | Source |
|---|---|---|
| OWA External URL | https://mail.contoso.com/owa | OWA Virtual Directory |
| OWA SSL Required | True | OWA Virtual Directory |
| ActiveSync SSL Required | True | ActiveSync Virtual Directory |
| Autodiscover SSL Required | True | Autodiscover Virtual Directory |
| Setting | Value | Source |
|---|---|---|
| Default Database Quota | 5GB | Mailbox Database |
| Deleted Item Retention | 14 days | Mailbox Database |
| Circular Logging | Disabled | Mailbox Database |
| Setting | Value | Source |
|---|---|---|
| Internal Send Connector TLS | Required | Send Connector |
| External Receive Connector Auth | TLS Required | Receive Connector |
| TLS Certificate Subject | mail.contoso.com | Transport Certificate |
| Setting | Value | Source |
|---|---|---|
| Request Filtering | Enabled | web.config |
| Custom Errors | On | web.config |
| Directory BrowsingSecurity | Disabled | web.config |
| Setting | Value | Source |
|---|---|---|
| IIS Version | 10.0 | applicationHost.config |
| Application Pool Identity | ApplicationPoolIdentity | App Pool Settings |
| .NET Runtime | v4.0 | App Pool Settings |
| Setting | Value | Source |
|---|---|---|
| SSL Certificate | *.contoso.com (Valid until 2027-06-15) | Binding |
| TLS 1.0 | Disabled | Registry |
| TLS 1.1 | Disabled | Registry |
| TLS 1.2 | Enabled | Registry |
| TLS 1.3 | Enabled | Registry |
| Setting | Value | Source |
|---|---|---|
| Force Encryption | True | Network Configuration |
| TDE EnabledSecurity | False | Database Properties |
| Setting | Value | Source |
|---|---|---|
| Authentication Mode | Windows and SQL Server | Server Properties |
| Audit Level | Failed Logins Only | Server Properties |
| Cross DB Ownership | Disabled | Server Properties |
| Setting | Value | Source |
|---|---|---|
| SA AccountSecurity | Enabled | Server Logins |
| xp_cmdshellSecurity | Disabled | sp_configure |
| CLR Enabled | Disabled | sp_configure |
| Remote Access | Disabled | sp_configure |
| Setting | Value | Source |
|---|---|---|
| Syslog Server | 10.1.1.100 | Log Forwarding |
| Traffic Log Severity | Informational | Log Settings |
| Setting | Value | Source |
|---|---|---|
| HTTPS Management | Enabled | Device > Setup |
| SSH Management | Enabled | Device > Setup |
| Telnet Management | Disabled | Device > Setup |
| Setting | Value | Source |
|---|---|---|
| PAN-OS Version | 11.1.2 | System Info |
| Threat Version | 8823-8438 | Content Versions |
| WildFire VersionSecurity | 0 | Content Versions |
| Setting | Value | Source |
|---|---|---|
| Job Encryption | AES-256 | Backup Job Properties |
| Backup Copy Enabled | Yes | Backup Copy Job |
| Immutability Period | 7 days | Repository Settings |
| Setting | Value | Source |
|---|---|---|
| Primary Repository Type | Linux Hardened | Repository |
| Repository Encryption | Enabled | Repository |
| Max Concurrent Tasks | 4 | Repository |
| Setting | Value | Source |
|---|---|---|
| Lockdown ModeSecurity | Normal | Host Configuration |
| SSH ServiceSecurity | Running | Host Services |
| Shell Service | Stopped | Host Services |
| DCUI Service | Running | Host Services |
| Setting | Value | Source |
|---|---|---|
| Promiscuous Mode | Reject | vSwitch Security |
| MAC Address Changes | Reject | vSwitch Security |
| Forged Transmits | Reject | vSwitch Security |
| Setting | Value | Source |
|---|---|---|
| SSO Domain | vsphere.local | vCenter Configuration |
| vCenter Version | 8.0 Update 2 | vCenter About |
| Distributed Switch Version | 8.0.0 | DVS Configuration |
Address these within 24-48 hours:
Address these within 1 week:
Address medium and low severity findings within 1-3 months as part of regular security hardening.