EXE_STACK_NAME
POLICY
Execute Stack
EXE_STACK_DESC
POLICY
Ensure that the OS configuration parameter, which enables execution of code on the user stack, is not enabled
EXE_STACK_IMPACT
POLICY
Enabling code execution on the user stack may allow a malicious user to exploit stack buffer overflows. Overflows can cause portions of a system to fail, or even execute arbitrary code.
EXE_STACK_RECOMM
POLICY
Disable code execution on the user stack.
OPEN_PORTS_NAME
POLICY
Open Ports
OPEN_PORTS_DESC
POLICY
Ensure that no unintended ports are left open
OPEN_PORTS_IMPACT
POLICY
Open ports may allow a malicious user to take over the host.
OPEN_PORTS_RECOMM
POLICY
Do not open insecure ports.
INSEC_SERV_NAME
POLICY
Insecure Services
INSEC_SERV_DESC
POLICY
Ensure that there are no insecure services (for example, telnet and ftp) running on the server
INSEC_SERV_IMPACT
POLICY
Insecure services may allow a malicious user to take over the host.
INSEC_SERV_RECOMM
POLICY
Do not run insecure services.
FILE_SYS_TYPE_NAME
POLICY
NTFS File System
FILE_SYS_TYPE_DESC
POLICY
Ensure that the file system on a Windows operating system uses NTFS
FILE_SYS_TYPE_IMPACT
POLICY
Other than NTFS, file systems on Windows platforms may have serious security risks.
FILE_SYS_TYPE_RECOMM
POLICY
On Windows operating systems, it is strongly recommended to use NTFS as the file system.