Rule ID
SV-242188r1028381_rule
Version
V2R2
CCIs
An IDPS can be capable of providing a wide variety of capabilities. Not all of these capabilities are necessary. Unnecessary services, functions, and applications increase the attack surface (sum of attack vectors) of a system. These unnecessary capabilities are often overlooked and therefore, may remain unsecured. Examples of unneeded services on TPS are web server, telnet, and TAXII.
1. In the Trend Micro SMS interface, go to the "Devices" tab. 2. Select the Device to be modified. 3. Click "Device Configuration" and "Services". If HTTPS or TAXII are enabled, this is a finding.
1. In the Trend Micro SMS interface, go to the "Devices" tab. 2. Select the device to be modified. 3. Click "Device Configuration" and "Services". 4. Uncheck enabled for HTTPS and TAXII. 5. Under SSH ensure "SSH Login Grace Time" is set to 60 and "SSH Max Authentication Attempts" is set to "3". 6. Click "OK".