A host-based firewall lets a user define a set of rules that controls incoming and outgoing network traffic across a particular device. This prevents unauthorized access and unrestricted connections to the device. Ensure firewall is installed and firewall rules are applied in the machine.
Linux - OS Security
Follow the below steps to resolve the misconfiguration.
It is advisable to install a standard firewall software and apply firewall rules in your network systems to prevent them from unrestricted connections.
Potential issues that may arise after applying the resolution
Altering the existing security setting may create the following impact in your network operations.
Does remediation require reboot?
Vulnerability Manager Plus tracks security configurations and remediate misconfigurations in your network systems from a centralized console. View a list of all the security misconfigurations detected by Vulnerability Manager Plus.