Technical Findings Report
| Cluster Name: | sample-cluster | Analysis Date: | January 09, 2026 at 04:30 PM |
| ONTAP Version: | 9.16.1P10 | Node Count: | 2 |
| Total Findings: | 324 | Security Grade: | Grade D (62) |
| Severity | Count | Description |
|---|---|---|
| CRITICAL | 0 | Requires immediate action - significant security risk |
| HIGH | 127 | High priority - remediate within 48-72 hours |
| MEDIUM | 27 | Schedule remediation during planned maintenance |
| LOW | 4 | Address during regular maintenance cycles |
| PASSED | 166 | Security control meets requirements |
| Function | Total | Issues | Passed | Description |
|---|---|---|---|---|
| Identify | 11 | 1 | 10 | Asset management and risk assessment |
| Protect | 205 | 90 | 115 | Safeguards to ensure service delivery |
| Detect | 49 | 36 | 13 | Timely discovery of cybersecurity events |
30 findings: 2 high | 9 medium | 3 low | 16 passed
Description: The LM compatibility level allows legacy LM and/or NTLMv1 authentication methods. LM (LAN Manager) hashes are cryptographically weak and can be cracked in seconds. NTLMv1 is also vulnerable to relay attacks and offline cracking. Modern environments should use NTLMv2 or Kerberos only.
Remediation:
Affected Items:
| Severity | Context | Value |
|---|---|---|
| HIGH | Vserver: sample-prod-nfs | lm-ntlm-ntlmv2-krb |
| HIGH | Vserver: sample-mgmt | lm-ntlm-ntlmv2-krb |
| MEDIUM | Vserver: sample-smb | false |
| PASSED | Vserver: sample-smb | krb |
27 findings: 27 high
Description: This network service policy allows connections from any IP address (0.0.0.0/0) for management services. This exposes administrative interfaces (SSH, HTTPS, HTTP) to potential unauthorized access from any network location, significantly increasing the attack surface.
Remediation:
Affected Items (showing first 6 of 27):
| Severity | Context | Value |
|---|---|---|
| HIGH | Vserver: sample-nfs-02 Policy: default-management Service: management-http | 0.0.0.0/0 |
| HIGH | Vserver: sample-nfs-02 Policy: default-management Service: management-https | 0.0.0.0/0 |
| HIGH | Vserver: sample-nfs-02 Policy: default-management Service: management-ssh | 0.0.0.0/0 |
| HIGH | Vserver: sample-smb Policy: default-management Service: management-http | 0.0.0.0/0 |
| HIGH | Vserver: sample-smb Policy: default-management Service: management-https | 0.0.0.0/0 |
| HIGH | Vserver: sample-smb Policy: default-management Service: management-ssh | 0.0.0.0/0 |
... and 21 more findings in this category
This sample shows 2 of 18 security categories analyzed. The full technical report includes detailed remediation steps with copy-paste CLI commands for all 324 findings across categories including:
Multi-Admin Verification • NFS Export Security • Volume Snapshots • Certificate Management • Ransomware Protection • User Profiles • VSCAN Status • Aggregate Encryption • And more...
1 findings: 1 passed
Description: FIPS 140-2 compliance mode is properly enabled. All cryptographic operations use NIST-validated algorithms including AES and SHA-256. TLS communications use only FIPS-approved cipher suites, protecting data integrity and confidentiality.
| Severity | Context | Value |
|---|---|---|
| PASSED | Cluster: sample-cluster | true |