Security Dashboard

Last scan: 2026-02-06 15:37:11
Blocked IPs
1
Firewall Status
ACTIVE
Failed Auth Attempts
617
Threat Level
medium
Open Ports
7
Active Alerts
1

Active Alerts

  • High number of failed authentication attempts

Recommendations

Disable password authentication, use SSH keys only high

Ensure SSH keys are configured before disabling passwords

$ Edit /etc/ssh/sshd_config: PasswordAuthentication no

Disable X11 forwarding medium

X11 forwarding can be exploited for attacks

$ Edit /etc/ssh/sshd_config: X11Forwarding no

Reduce maximum authentication attempts medium

Current: 6, Recommended: 4

$ Edit /etc/ssh/sshd_config: MaxAuthTries 4

Install AIDE for file integrity monitoring medium

No file integrity monitoring tools installed

$ apt install aide && aideinit

Disable ICMP redirects medium

net.ipv4.conf.all.send_redirects = 1 (should be 0)

$ sysctl -w net.ipv4.conf.all.send_redirects=0

Disable ICMP redirects medium

net.ipv4.conf.default.send_redirects = 1 (should be 0)

$ sysctl -w net.ipv4.conf.default.send_redirects=0

Reject secure ICMP redirects medium

net.ipv4.conf.all.secure_redirects = 1 (should be 0)

$ sysctl -w net.ipv4.conf.all.secure_redirects=0

Log suspicious packets medium

net.ipv4.conf.all.log_martians = 0 (should be 1)

$ sysctl -w net.ipv4.conf.all.log_martians=1

Set password expiration to 90 days or less medium

Password expiration disabled (PASS_MAX_DAYS=99999)

$ Edit /etc/login.defs: PASS_MAX_DAYS 90

Apply all system updates medium

15 total updates pending (including kernel)

$ apt update && apt upgrade -y

Require password for sudo commands medium

NOPASSWD sudo configured (passwordless sudo)

$ Edit /etc/sudoers.d/*: remove NOPASSWD

Set SSH idle timeout low

Current: 0, Recommended: 300

$ Edit /etc/ssh/sshd_config: ClientAliveInterval 300, ClientAliveCountMax 2

Set UMASK to 027 for better security low

Default UMASK is 022 (too permissive)

$ Edit /etc/login.defs: UMASK 027

Fail2ban active - 1 IPs currently banned info

Intrusion prevention is working correctly

Firewall Activity

  • UFW Status active
  • IPTables Rules 166

Open Ports

14879 53 5678 5679 65529 8080 9000

Areas Scanned

SSH configuration (CIS benchmarks)
Root and user account security
Password and authentication policies
Kernel hardening (sysctl)
File integrity monitoring
Audit logging
System updates and patches
Firewall rules and status
Fail2ban intrusion prevention
Failed authentication attempts
Active network connections
Running processes
Recently modified system files

Blocked IP Details

  • IPTables Blocked 0
  • Fail2ban Blocked 1
  • Total Unique 1