Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 4 Current »

Severity : High

Description : All network file systems should be configured to only allow access from trusted sources.

Remediation Steps : Ensure that all file systems do not have public access.

  • No labels