Source | Azure Portal | ||||||||||||||
Display name | [Preview]: Machines should have ports closed that might expose attack vectors | ||||||||||||||
Id | af99038c-02fd-4a2f-ac24-386b62bf32de | ||||||||||||||
Version | 1.0.0-preview Details on versioning |
||||||||||||||
Versioning |
Versions supported for Versioning: 1 1.0.0-preview Built-in Versioning [Preview] |
||||||||||||||
Category | Security Center Microsoft Learn |
||||||||||||||
Description | Azure's Terms Of Use prohibit the use of Azure services in ways that could damage, disable, overburden, or impair any Microsoft server, or the network. The exposed ports identified by this recommendation need to be closed for your continued security. For each identified port, the recommendation also provides an explanation of the potential threat. | ||||||||||||||
Mode | Indexed | ||||||||||||||
Type | BuiltIn | ||||||||||||||
Preview | True | ||||||||||||||
Deprecated | False | ||||||||||||||
Effect | Default AuditIfNotExists Allowed AuditIfNotExists, Disabled |
||||||||||||||
RBAC role(s) | none | ||||||||||||||
Rule aliases | THEN-ExistenceCondition (1)
|
||||||||||||||
Rule resource types | IF (1) Microsoft.Compute/virtualMachines |
||||||||||||||
Compliance | Not a Compliance control | ||||||||||||||
Initiatives usage | none | ||||||||||||||
History |
|
||||||||||||||
JSON compare | n/a | ||||||||||||||
JSON |
|