About the modules

Networked computers are vulnerable to unauthorized access and denial-of-service attacks in several key areas. Modules contain the checks that evaluate and report on the security of these vulnerable areas. The checks assess the settings of the security controls in a systematic way. Each check assesses one area of potential risk.

Modules fall into one of the following categories: