Azure_VirtualNetworks_171
VNC Server is considered a protocol that should only be exposed in private networks, for a limited scope, allowing access to only applications and services that requires access. Limiting access is a good practice that prevents exploits through public interfaces or east west lateral movement.This rule detects network settings that allow over permissive network access for VNC Server
Limit the access scope for VNC Server to only allow access in internal networks and limited scope.If public interface exists, remove it and limit the access scope within the VNET only to applications or instances that requires access.
See https://docs.microsoft.com/en-us/azure/virtual-machines/virtual-machines-windows-nsg-quickstart-portalWant to Know More?
Learn how our partners are managing their cloud security and compliance with Cloudlytics.
I hereby accept the GDPR and Privacy Policy, by subscribing to the newsletters.