The operating system must protect wireless access to and from the system using encryption.
25 rules found Severity: Medium