Skip to main content

Configure key encryption

Summary​

The organization must prefer the use of WPA2 Personal or WPA2 Enterprise (802.1x) key encryption methods.

Description​

empty

Supported In​

This requirement is verified in following services

PlanSupported
Machine🔴
Squad🟢

References​

Vulnerabilities​

free trial

Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.