Security Dashboard
Last scan: 2026-02-06 15:37:11
Blocked IPs
1
Firewall Status
ACTIVE
Failed Auth Attempts
617
Threat Level
medium
Open Ports
7
Active Alerts
1
Active Alerts
- High number of failed authentication attempts
Recommendations
Disable password authentication, use SSH keys only high
Ensure SSH keys are configured before disabling passwords
$ Edit /etc/ssh/sshd_config: PasswordAuthentication no
Disable X11 forwarding medium
X11 forwarding can be exploited for attacks
$ Edit /etc/ssh/sshd_config: X11Forwarding no
Reduce maximum authentication attempts medium
Current: 6, Recommended: 4
$ Edit /etc/ssh/sshd_config: MaxAuthTries 4
Install AIDE for file integrity monitoring medium
No file integrity monitoring tools installed
$ apt install aide && aideinit
Disable ICMP redirects medium
net.ipv4.conf.all.send_redirects = 1 (should be 0)
$ sysctl -w net.ipv4.conf.all.send_redirects=0
Disable ICMP redirects medium
net.ipv4.conf.default.send_redirects = 1 (should be 0)
$ sysctl -w net.ipv4.conf.default.send_redirects=0
Reject secure ICMP redirects medium
net.ipv4.conf.all.secure_redirects = 1 (should be 0)
$ sysctl -w net.ipv4.conf.all.secure_redirects=0
Log suspicious packets medium
net.ipv4.conf.all.log_martians = 0 (should be 1)
$ sysctl -w net.ipv4.conf.all.log_martians=1
Set password expiration to 90 days or less medium
Password expiration disabled (PASS_MAX_DAYS=99999)
$ Edit /etc/login.defs: PASS_MAX_DAYS 90
Apply all system updates medium
15 total updates pending (including kernel)
$ apt update && apt upgrade -y
Require password for sudo commands medium
NOPASSWD sudo configured (passwordless sudo)
$ Edit /etc/sudoers.d/*: remove NOPASSWD
Set SSH idle timeout low
Current: 0, Recommended: 300
$ Edit /etc/ssh/sshd_config: ClientAliveInterval 300, ClientAliveCountMax 2
Set UMASK to 027 for better security low
Default UMASK is 022 (too permissive)
$ Edit /etc/login.defs: UMASK 027
Fail2ban active - 1 IPs currently banned info
Intrusion prevention is working correctly
Firewall Activity
- UFW Status active
- IPTables Rules 166
Open Ports
Areas Scanned
SSH configuration (CIS benchmarks)
Root and user account security
Password and authentication policies
Kernel hardening (sysctl)
File integrity monitoring
Audit logging
System updates and patches
Firewall rules and status
Fail2ban intrusion prevention
Failed authentication attempts
Active network connections
Running processes
Recently modified system files
Blocked IP Details
- IPTables Blocked 0
- Fail2ban Blocked 1
- Total Unique 1