Skip to content

III - Administrative Public

Rules and Groups employed by this XCCDF Profile

  • SRG-NET-000362-ALG-000112

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG providing content filtering must protect against known and unknown types of denial-of-service (DoS) attacks by employing rate-based attack prevention behavior analysis.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Installation...
    Rule Medium Severity
  • SRG-NET-000362-ALG-000120

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must implement load balancing to limit the effects of known and unknown types of denial-of-service (DoS) attacks.

    &lt;VulnDiscussion&gt;If the network does not provide safeguards against DoS attacks, network resources will be unavailable to users. Load balancin...
    Rule Medium Severity
  • SRG-NET-000192-ALG-000121

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must block outbound traffic containing known and unknown denial-of-service (DoS) attacks to protect against the use of internal information systems to launch any DoS attacks against other networks or endpoints.

    &lt;VulnDiscussion&gt;DoS attacks can take multiple forms but have the common objective of overloading or blocking a network or host to deny or ser...
    Rule Medium Severity
  • SRG-NET-000364-ALG-000122

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must allow incoming communications only from organization-defined authorized sources routed to organization-defined authorized destinations.

    &lt;VulnDiscussion&gt;Unrestricted traffic may contain malicious traffic that poses a threat to an enclave or to other connected networks. Addition...
    Rule Medium Severity
  • SRG-NET-000365-ALG-000123

    <GroupDescription></GroupDescription>
    Group
  • Symantec ProxySG must fail securely in the event of an operational failure.

    &lt;VulnDiscussion&gt;If a boundary protection device fails in an unsecure manner (open), information external to the boundary protection device ma...
    Rule Medium Severity

The content of the drawer really is up to you. It could have form fields, definition lists, text lists, labels, charts, progress bars, etc. Spacing recommendation is 24px margins. You can put tabs in here, and can also make the drawer scrollable.

Capacity
Modules