Find out if you have vulnerabilities that put you at risk
Test your applications
Toggle filtering controls
All service groups
AWS
Azure
All Azure service groups
API Management
App Service (Web Apps)
Authorization
Automation
Batch
CDN
Compute
Container
CosmosDB (DocumentDB)
Data Factory
Data Lake
Database
Key Vault
Monitor
Network
Redis
Role
Search
Security Center
Service Fabric
Storage
Synapse
Google
Kubernetes
Report a new vulnerability
RULE
SERVICE GROUP
M
Virtual Machine unattached managed disks should be encrypted with Customer Managed Keys
Storage
M
Virtual Machines should use Managed Disks
Storage
M
Virtual network DDoS protection plan is disabled
Network
M
Virtual Network Network Watcher should be enabled
Monitor
M
Virtual network security group permits ingress from '0.0.0.0/0' to port 22 (SSH)
Network
M
VM Agent is not provisioned automatically for linux
Compute
M
VM Agent is not provisioned automatically for Windows
Compute
M
VPC default security group allows unrestricted egress traffic
VPC
M
VPC default security group allows unrestricted ingress traffic
VPC
M
VPC endpoint policy allows full access to service
VPC
M
VPC flow logging is not enabled
VPC
M
VPC flow logs for VPC network subnets are disabled
Compute Engine
M
VPC network ACL allows ingress from '0.0.0.0/0' to port 22
VPC
M
VPC network ACL allows ingress from 0.0.0.0/0 to port 3389
VPC
M
VPC security group allows ingress from any address to all ports and protocols
VPC
M
VPC security group attached to EC2 instance allows ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group attached to EC2 instance permits ingress from '0.0.0.0/0' to port 389 (LDAP)
VPC
M
VPC security group attached to RDS instance permits ingress from '0.0.0.0/0' to all ports
VPC
M
VPC security group inbound rule allows ingress from '0.0.0.0/0' to all ports and protocols
VPC
M
VPC security group inbound rule permits ingress from a public address to all ports and protocols
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11214 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 11215 (Memcached SSL)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 135 (MSSQL Debugger)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 137 (NetBIOS Name Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 138 (NetBios Datagram Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 139 (NetBios Session Service)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1433 (MSSQL Server)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 1434 (MSSQL Admin)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 22 (SSH)
VPC
M
VPC security group rule permits ingress from '0.0.0.0/0' to port 23 (Telnet)
VPC
Previous
Next