Below is a screenshot from a deployed next-generation firewall. These configuration settings would be a defensive measure for which CIS Control?
Controlled Access Based on the Need to Know
Limitation and Control of Network Ports, Protocols and Services
Email and Web Browser Protections
Secure Configuration for Network Devices, such as Firewalls, Routers and Switches.
Submit