STIG ID: WN11-00-000135 | SRG: SRG-OS-000480-GPOS-00227 | Severity: medium | CCI: | Vulnerability Id: V-253281
A firewall provides a line of defense against attack, allowing or blocking inbound and outbound connections based on a set of rules.
Install and enable a host-based firewall on the system.
Determine if a host-based firewall is installed and enabled on the system. If a host-based firewall is not installed and enabled on the system, this is a finding.
The configuration requirements will be determined by the applicable firewall STIG.