mirror of
https://github.com/empayre/fleet.git
synced 2024-11-06 08:55:24 +00:00
Fix Windows CIS policies issues found by new fleetctl apply checks (#13460)
Found while working on #12696. This was caught be a recent check added by @mostlikelee to `fleetctl apply` (#13294). Sample error: ```sh $ fleetctl apply --context loadtest -f ee/cis/win-10/cis-policy-queries.yml Error: applying policies: policy names must be globally unique. Please correct policy "CIS - Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'\n" and try again. ```
This commit is contained in:
parent
9d99b7fb05
commit
77c817aa0b
1
changes/fix-duplicate-cis-policy-queries-yml
Normal file
1
changes/fix-duplicate-cis-policy-queries-yml
Normal file
@ -0,0 +1 @@
|
||||
* Fix duplicate policy names in `ee/cis/win-10/cis-policy-queries.yml`.
|
@ -3616,25 +3616,6 @@ spec:
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: policy
|
||||
spec:
|
||||
name: >
|
||||
CIS - Ensure 'Windows Firewall: Public: Firewall state' is set to 'On (recommended)'
|
||||
platforms: win10
|
||||
platform: windows
|
||||
description: |
|
||||
Select On (recommended) to have Windows Firewall with Advanced Security use the settings for this profile to filter network traffic. If you select Off, Windows Firewall with Advanced Security will not use any of the firewall rules or connection security rules for this profile.
|
||||
The recommended state for this setting is: On (recommended).
|
||||
resolution: |
|
||||
To establish the recommended configuration via GP, set the following UI path to On (recommended):
|
||||
'Computer Configuration\Policies\Windows Settings\Security Settings\Windows Defender Firewall with Advanced Security\Windows Defender Firewall with Advanced Security - Local Group Policy Object\Windows Defender Firewall Properties\Public Profile\Firewall state'
|
||||
query: |
|
||||
SELECT 1 FROM registry WHERE (path = 'HKEY_LOCAL_MACHINE\\SOFTWARE\\Policies\\Microsoft\\WindowsFirewall\\PublicProfile\EnableFirewall' and data == 1);
|
||||
purpose: Informational
|
||||
tags: compliance, CIS, CIS_Level1, CIS_win10_enterprise_1.12.0, CIS_bullet_9.3.9
|
||||
contributors: RachelElysia
|
||||
---
|
||||
apiVersion: v1
|
||||
kind: policy
|
||||
spec:
|
||||
name: >
|
||||
CIS - Ensure 'Windows Firewall: Public: Logging: Log successful connections' is set to 'Yes'
|
||||
@ -9360,7 +9341,7 @@ apiVersion: v1
|
||||
kind: policy
|
||||
spec:
|
||||
name: >
|
||||
CIS - Ensure 'Allow Basic authentication' is set to 'Disabled'
|
||||
CIS - Ensure 'Allow Basic authentication' in WinRM service is set to 'Disabled'
|
||||
platforms: win10
|
||||
platform: windows
|
||||
description: |
|
||||
@ -9398,7 +9379,7 @@ apiVersion: v1
|
||||
kind: policy
|
||||
spec:
|
||||
name: >
|
||||
CIS - Ensure 'Allow unencrypted traffic' is set to 'Disabled'
|
||||
CIS - Ensure 'Allow unencrypted traffic' in WinRM service is set to 'Disabled'
|
||||
platforms: win10
|
||||
platform: windows
|
||||
description: |
|
||||
@ -9905,7 +9886,7 @@ apiVersion: v1
|
||||
kind: policy
|
||||
spec:
|
||||
name: >
|
||||
CIS - Ensure 'Always install with elevated privileges' is set to 'Disabled'
|
||||
CIS - Ensure 'Always install with elevated privileges' is set to 'Disabled' (User Configuration)
|
||||
platforms: win10
|
||||
platform: windows
|
||||
description: |
|
||||
|
Loading…
Reference in New Issue
Block a user