CCE-42862-3Platform: win10 | Date: (C)2016-09-23 (M)2022-10-10 |
Disable: 'IP address range Exclusions' for Nis_Consumers_IPS_Exclusions_Ip_Ranges_Ip_Range
This policy, if defined, will prevent network protection against exploits of known vulnerabilities from inspecting the specified IP addresses. IP addresses should be added under the Options for this setting. Each entry must be listed as a name value pair, where the name should be a string representation of an IP address range. As an example, a range might be defined as: 157.1.45.123-60.1.1.1. The value is not used and it is recommended that this be set to 0.
Counter Measure:
Configure this setting depending on your organization's requirements.
Potential Impact:
The specified IP addresses will be inspected and could impact performance.
Parameter:
Technical Mechanism:
(1) GPO: Computer Configuration\Administrative Templates\Windows Components\Windows Defender\Network Inspection System Exclusions\IP address range Exclusions
(2) REG: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows Defender\NIS\Consumers\IPS\Exclusions\IP Ranges\Nis_Consumers_IPS_Exclusions_Ip_Ranges_Ip_Range
CCSS Severity: | CCSS Metrics: |
CCSS Score : | Attack Vector: |
Exploit Score: | Attack Complexity: |
Impact Score: | Privileges Required: |
Severity: | User Interaction: |
Vector: | Scope: |
| Confidentiality: |
| Integrity: |
| Availability: |
| |
References: Resource Id | Reference |
---|
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35200 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35200 |
SCAP Repo OVAL Definition | oval:org.secpod.oval:def:35200 |